default search action
Search dblp for Publications
export results for "stream:streams/conf/raid:"
@inproceedings{DBLP:conf/raid/0001DACW23, author = {Yizheng Chen and Zhoujie Ding and Lamya Alowain and Xinyun Chen and David A. Wagner}, title = {DiverseVul: {A} New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {654--668}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607242}, doi = {10.1145/3607199.3607242}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/0001DACW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AbbadiniFORP23, author = {Marco Abbadini and Dario Facchinetti and Gianluca Oldani and Matthew Rossi and Stefano Paraboschi}, title = {NatiSand: Native Code Sandboxing for JavaScript Runtimes}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {639--653}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607233}, doi = {10.1145/3607199.3607233}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AbbadiniFORP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlamBPR23, author = {Md Tanvirul Alam and Dipkamal Bhusal and Youngja Park and Nidhi Rastogi}, title = {Looking Beyond IoCs: Automatically Extracting Attack Patterns from External {CTI}}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {92--108}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607208}, doi = {10.1145/3607199.3607208}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AlamBPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlecciABCLOT23, author = {Marco Alecci and Luca Attanasio and Alessandro Brighente and Mauro Conti and Eleonora Losiouk and Hideki Ochiai and Federico Turrin}, title = {Beware of Pickpockets: {A} Practical Attack against Blocking Cards}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {195--206}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607243}, doi = {10.1145/3607199.3607243}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AlecciABCLOT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlecciCMMP23, author = {Marco Alecci and Mauro Conti and Francesco Marchiori and Luca Martinelli and Luca Pajola}, title = {Your Attack Is Too {DUMB:} Formalizing Attacker Scenarios for Adversarial Transferability}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {315--329}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607227}, doi = {10.1145/3607199.3607227}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AlecciCMMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlsadiSYEG23, author = {Arwa Abdulkarim Al Alsadi and Kaichi Sameshima and Katsunari Yoshioka and Michel van Eeten and Carlos Hernandez Ga{\~{n}}{\'{a}}n}, title = {Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {513--526}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607241}, doi = {10.1145/3607199.3607241}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AlsadiSYEG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AnwarZYL23, author = {Md Sakib Anwar and Chaoshun Zuo and Carter Yagemann and Zhiqiang Lin}, title = {Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {17--31}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607211}, doi = {10.1145/3607199.3607211}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AnwarZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaskaranZMY23, author = {Supraja Baskaran and Lianying Zhao and Mohammad Mannan and Amr M. Youssef}, title = {Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {727--743}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607236}, doi = {10.1145/3607199.3607236}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaskaranZMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaumanDHL23, author = {Erick Bauman and Jun Duan and Kevin W. Hamlen and Zhiqiang Lin}, title = {Renewable Just-In-Time Control-Flow Integrity}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {580--594}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607239}, doi = {10.1145/3607199.3607239}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaumanDHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BoltonL0HF23, author = {Connor Bolton and Yan Long and Jun Han and Josiah D. Hester and Kevin Fu}, title = {Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {164--178}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607203}, doi = {10.1145/3607199.3607203}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BoltonL0HF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BoucherPSAC23, author = {Nicholas Boucher and Luca Pajola and Ilia Shumailov and Ross J. Anderson and Mauro Conti}, title = {Boosting Big Brother: Attacking Search Engines with Encodings}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {700--713}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607220}, doi = {10.1145/3607199.3607220}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BoucherPSAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BundtDAOR23, author = {Joshua Bundt and Michael Davinroy and Ioannis Agadakos and Alina Oprea and William K. Robertson}, title = {Black-box Attacks Against Neural Binary Function Detection}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {1--16}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607200}, doi = {10.1145/3607199.3607200}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BundtDAOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BytesRDM0T23, author = {Andrei Bytes and Prashant Hari Narayan Rajput and Constantine Doumanidis and Michail Maniatakos and Jianying Zhou and Nils Ole Tippenhauer}, title = {FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {499--512}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607226}, doi = {10.1145/3607199.3607226}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BytesRDM0T23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Camara0AUZ23, author = {Xabier S{\'{a}}ez de C{\'{a}}mara and Jose Luis Flores and Crist{\'{o}}bal Arellano and Aitor Urbieta and Urko Zurutuza}, title = {Federated Explainability for Network Anomaly Characterization}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {346--365}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607234}, doi = {10.1145/3607199.3607234}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Camara0AUZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaoL23, author = {Tong Cao and Xin Li}, title = {Temporary Block Withholding Attacks on Filecoin's Expected Consensus}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {109--122}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607213}, doi = {10.1145/3607199.3607213}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CaoL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Chen0GWY23, author = {Bocheng Chen and Guangjing Wang and Hanqing Guo and Yuanda Wang and Qiben Yan}, title = {Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {282--296}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607237}, doi = {10.1145/3607199.3607237}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Chen0GWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenLCLXH23, author = {Jingting Chen and Feng Li and Qingfang Chen and Ping Li and Lili Xu and Wei Huo}, title = {EBugDec: Detecting Inconsistency Bugs caused by {RFC} Evolution in Protocol Implementations}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {412--425}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607222}, doi = {10.1145/3607199.3607222}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ChenLCLXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenLXW23, author = {Zeyu Chen and Daiping Liu and Jidong Xiao and Haining Wang}, title = {All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {623--638}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607229}, doi = {10.1145/3607199.3607229}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChenLXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChowdhuryN23, author = {Abdullahi Chowdhury and Hung X. Nguyen}, title = {CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {426--439}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607228}, doi = {10.1145/3607199.3607228}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChowdhuryN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DrichelM23, author = {Arthur Drichel and Ulrike Meyer}, title = {False Sense of Security: Leveraging {XAI} to Analyze the Reasoning and True Performance of Context-less {DGA} Classifiers}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {330--345}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607231}, doi = {10.1145/3607199.3607231}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DrichelM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaidisMSMAK23, author = {Alexander J. Gaidis and Joao Moreira and Ke Sun and Alyssa Milburn and Vaggelis Atlidakis and Vasileios P. Kemerlis}, title = {FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {527--546}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607219}, doi = {10.1145/3607199.3607219}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GaidisMSMAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Guo0WCY023, author = {Hanqing Guo and Guangjing Wang and Yuanda Wang and Bocheng Chen and Qiben Yan and Li Xiao}, title = {PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {366--380}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607240}, doi = {10.1145/3607199.3607240}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Guo0WCY023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GustafsonGRJC0F23, author = {Eric Gustafson and Paul Grosen and Nilo Redini and Saagar Jha and Andrea Continella and Ruoyu Wang and Kevin Fu and Sara Rampazzi and Christopher Kruegel and Giovanni Vigna}, title = {Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {32--45}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607217}, doi = {10.1145/3607199.3607217}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GustafsonGRJC0F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HangLWX23, author = {Zijun Hang and Yuliang Lu and Yongjie Wang and Yi Xie}, title = {Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {297--314}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607206}, doi = {10.1145/3607199.3607206}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HangLWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HeF23, author = {Qiuye He and Song Fang}, title = {Phantom-CSI Attacks against Wireless Liveness Detection}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {440--454}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607245}, doi = {10.1145/3607199.3607245}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HeF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HertoghWOMABG23, author = {Math{\'{e}} Hertogh and Manuel Wiesinger and Sebastian {\"{O}}sterlund and Marius Muench and Nadav Amit and Herbert Bos and Cristiano Giuffrida}, title = {Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {207--221}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607248}, doi = {10.1145/3607199.3607248}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HertoghWOMABG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KawakoyaAIO23, author = {Yuhei Kawakoya and Shu Akabane and Makoto Iwamura and Takeshi Okamoto}, title = {Xunpack: Cross-Architecture Unpacking for Linux IoT Malware}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {471--484}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607214}, doi = {10.1145/3607199.3607214}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KawakoyaAIO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KimCLBP23, author = {Hyunjun Kim and Yungi Cho and Younghan Lee and Ho Bae and Yunheung Paek}, title = {Exploring Clustered Federated Learning's Vulnerability against Property Inference Attack}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {236--249}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607218}, doi = {10.1145/3607199.3607218}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KimCLBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KimPK23, author = {Taeyoung Kim and Seonhye Park and Hyoungshick Kim}, title = {Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {669--685}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607244}, doi = {10.1145/3607199.3607244}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KimPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KingSJELH23, author = {Isaiah J. King and Xiaokui Shu and Jiyong Jang and Kevin Eykholt and Taesung Lee and H. Howie Huang}, title = {EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {77--91}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607201}, doi = {10.1145/3607199.3607201}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KingSJELH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KoYJJGKJ23, author = {Myeongseob Ko and Xinyu Yang and Zhengjie Ji and Hoang Anh Just and Peng Gao and Anoop Kumar and Ruoxi Jia}, title = {PrivMon: {A} Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {264--281}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607232}, doi = {10.1145/3607199.3607232}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/KoYJJGKJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LanvinGHMMT23, author = {Maxime Lanvin and Pierre{-}Fran{\c{c}}ois Gimenez and Yufei Han and Fr{\'{e}}d{\'{e}}ric Majorczyk and Ludovic M{\'{e}} and Eric Totel}, title = {Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {135--150}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607247}, doi = {10.1145/3607199.3607247}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LanvinGHMMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiCPZZ023, author = {Lin Li and Chao Chen and Lei Pan and Leo Yu Zhang and Jun Zhang and Yang Xiang}, title = {SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {686--699}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607209}, doi = {10.1145/3607199.3607209}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiCPZZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NaKS23, author = {Seung Ho Na and Kwanwoo Kim and Seungwon Shin}, title = {Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {250--263}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607224}, doi = {10.1145/3607199.3607224}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NaKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ParkK23, author = {Jaemin Park and Brent ByungHoon Kang}, title = {EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud {VPN}}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {397--411}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607210}, doi = {10.1145/3607199.3607210}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ParkK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ParkKL23, author = {Sangbin Park and Youngjoon Kim and Dong Hoon Lee}, title = {{SCVMON:} Data-oriented attack recovery for RVs based on safety-critical variable monitoring}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {547--563}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607221}, doi = {10.1145/3607199.3607221}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ParkKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RosselMS23, author = {Jost Rossel and Vladislav Mladenov and Juraj Somorovsky}, title = {Security Analysis of the 3MF Data Format}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {179--194}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607216}, doi = {10.1145/3607199.3607216}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RosselMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SpahnHHKV23, author = {Noah Spahn and Nils Hanke and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, title = {Container Orchestration Honeypot: Observing Attacks in the Wild}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {381--396}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607205}, doi = {10.1145/3607199.3607205}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TandonWWABHM23, author = {Rajat Tandon and Haoda Wang and Nicolaas Weideman and Shushan Arakelyan and Genevieve Bartlett and Christophe Hauser and Jelena Mirkovic}, title = {Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {744--758}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607238}, doi = {10.1145/3607199.3607238}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TandonWWABHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TarkhaniM23, author = {Zahra Tarkhani and Anil Madhavapeddy}, title = {Information Flow Tracking for Heterogeneous Compartmentalized Software}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {564--579}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607235}, doi = {10.1145/3607199.3607235}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TarkhaniM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TrampertSR23, author = {Leon Trampert and Ben Stock and Sebastian Roth}, title = {Honey, {I} Cached our Security Tokens Re-usage of Security Tokens in the Wild}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {714--726}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607223}, doi = {10.1145/3607199.3607223}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TrampertSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangWZNHZ23, author = {Yu Wang and Jinting Wu and Haodong Zheng and Zhenyu Ning and Boyuan He and Fengwei Zhang}, title = {Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on {RISC-V}}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {595--608}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607246}, doi = {10.1145/3607199.3607246}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangWZNHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WongMYC23, author = {Harry W. H. Wong and Jack P. K. Ma and Hoover H. F. Yin and Sherman S. M. Chow}, title = {How (Not) to Build Threshold EdDSA}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {123--134}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607230}, doi = {10.1145/3607199.3607230}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WongMYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Xie00023, author = {Zhixin Xie and Chen Yan and Xiaoyu Ji and Wenyuan Xu}, title = {BitDance: Manipulating {UART} Serial Communication with {IEMI}}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {63--76}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607249}, doi = {10.1145/3607199.3607249}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Xie00023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Xu0D23, author = {Xuening Xu and Chenglong Fu and Xiaojiang Du}, title = {MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {46--62}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607225}, doi = {10.1145/3607199.3607225}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Xu0D23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuL0L23, author = {Shengjie Xu and Eric Liu and Wei Huang and David Lie}, title = {{MIFP:} Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {609--622}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607212}, doi = {10.1145/3607199.3607212}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuL0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XueH023, author = {Zihan Xue and Jinchi Han and Wei Song}, title = {{CTPP:} {A} Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {151--163}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607202}, doi = {10.1145/3607199.3607202}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XueH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YinLR23, author = {Haikuo Yin and Brandon Lou and Peter L. Reiher}, title = {A Method for Summarizing and Classifying Evasive Malware}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {455--470}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607207}, doi = {10.1145/3607199.3607207}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YinLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YuWFF023, author = {Donghui Yu and Jianqiang Wang and Haoran Fang and Ya Fang and Yuanyuan Zhang}, title = {SEnFuzzer: Detecting {SGX} Memory Corruption via Information Feedback and Tailored Interface Analysis}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {485--498}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607215}, doi = {10.1145/3607199.3607215}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YuWFF023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangL0CGDC23, author = {Liwei Zhang and Linghui Li and Xiaoyong Li and Binsi Cai and Yali Gao and Ruobin Dou and Luying Chen}, title = {Efficient Membership Inference Attacks against Federated Learning via Bias Differences}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {222--235}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607204}, doi = {10.1145/3607199.3607204}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangL0CGDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2023, title = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199}, doi = {10.1145/3607199}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0002LLMYLZ22, author = {Yang Shi and Junqing Liang and Mianhong Li and Tianchen Ma and Guodong Ye and Jiangfeng Li and Qinpei Zhao}, title = {Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {129--142}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545977}, doi = {10.1145/3545948.3545977}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/0002LLMYLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AbusnainaAAAJNM22, author = {Ahmed Abusnaina and Afsah Anwar and Sultan Alshamrani and Abdulrahman Alabduljabbar and RhongHo Jang and DaeHun Nyang and David Mohaisen}, title = {Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {308--320}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545960}, doi = {10.1145/3545948.3545960}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/AbusnainaAAAJNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaruaF22, author = {Anomadarshi Barua and Mohammad Abdullah Al Faruque}, title = {{HALC:} {A} Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {185--199}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545964}, doi = {10.1145/3545948.3545964}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaruaF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CloostersPWDJSD22, author = {Tobias Cloosters and David Paa{\ss}en and Jianqiang Wang and Oussama Draissi and Patrick Jauernig and Emmanuel Stapf and Lucas Davi and Ahmad{-}Reza Sadeghi}, title = {RiscyROP: Automated Return-Oriented Programming Attacks on {RISC-V} and {ARM64}}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {30--42}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545997}, doi = {10.1145/3545948.3545997}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CloostersPWDJSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FengLS22, author = {Yebo Feng and Jun Li and Devkishen Sisodia}, title = {CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {482--494}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545973}, doi = {10.1145/3545948.3545973}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FengLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FranzenHAKG22, author = {Fabian Franzen and Tobias Holl and Manuel Andreas and Julian Kirsch and Jens Grossklags}, title = {Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {214--231}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545980}, doi = {10.1145/3545948.3545980}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/FranzenHAKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FuLQZZYLD22, author = {Zhuoqun Fu and Mingxuan Liu and Yue Qin and Jia Zhang and Yuan Zou and Qilei Yin and Qi Li and Haixin Duan}, title = {Encrypted Malware Traffic Detection via Graph-based Network Analysis}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {495--509}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545983}, doi = {10.1145/3545948.3545983}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/FuLQZZYLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HasanGP22, author = {Md. Mehedi Hasan and Seyedhamed Ghavamnia and Michalis Polychronakis}, title = {Decap: Deprivileging Programs by Reducing Their Capabilities}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {395--408}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545978}, doi = {10.1145/3545948.3545978}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HasanGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HeWXFWLC022, author = {Xu He and Shu Wang and Yunlong Xing and Pengbin Feng and Haining Wang and Qi Li and Songqing Chen and Kun Sun}, title = {BinProv: Binary Code Provenance Identification without Disassembly}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {350--363}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545956}, doi = {10.1145/3545948.3545956}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HeWXFWLC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HuHD22, author = {Zhenghao Hu and Yu Hu and Brendan Dolan{-}Gavitt}, title = {Towards Deceptive Defense in Software Security with Chaff Bugs}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {43--55}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545981}, doi = {10.1145/3545948.3545981}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HuHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JangAYTCK22, author = {Daehee Jang and Ammar Askar and Insu Yun and Stephen Tong and Yiqin Cai and Taesoo Kim}, title = {Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {1--16}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545971}, doi = {10.1145/3545948.3545971}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JangAYTCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JeongKH22, author = {Hoyong Jeong and Hodong Kim and Junbeom Hur}, title = {Exploiting Metaobjects to Reinforce Data Leakage Attacks}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {17--29}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545965}, doi = {10.1145/3545948.3545965}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JeongKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiangSK22, author = {Jianyu Jiang and Claudio Soriente and Ghassan Karame}, title = {On the Challenges of Detecting Side-Channel Attacks in {SGX}}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {86--98}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545972}, doi = {10.1145/3545948.3545972}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/JiangSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KalantariZB0SD22, author = {Faezeh Kalantari and Mehrnoosh Zaeifi and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}}}, title = {Context-Auditor: Context-sensitive Content Injection Mitigation}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {431--445}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545992}, doi = {10.1145/3545948.3545992}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KalantariZB0SD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaLW0H0L22, author = {Baihe Ma and Xiaojie Lin and Xu Wang and Bin Liu and Ying He and Wei Ni and Ren Ping Liu}, title = {New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {160--170}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545982}, doi = {10.1145/3545948.3545982}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaLW0H0L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NatatsukaI0ASM22, author = {Atsuko Natatsuka and Ryo Iijima and Takuya Watanabe and Mitsuaki Akiyama and Tetsuya Sakai and Tatsuya Mori}, title = {Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {143--159}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545970}, doi = {10.1145/3545948.3545970}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NatatsukaI0ASM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Ou0G0022, author = {Haoran Ou and Yong Fang and Yongyan Guo and Wenbo Guo and Cheng Huang}, title = {Viopolicy-Detector: An Automated Approach to Detecting {GDPR} Suspected Compliance Violations in Websites}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {409--430}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545952}, doi = {10.1145/3545948.3545952}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Ou0G0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Pham0H22, author = {Duy{-}Phuc Pham and Damien Marion and Annelie Heuser}, title = {{ULTRA:} Ultimate Rootkit Detection over the Air}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {232--251}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545962}, doi = {10.1145/3545948.3545962}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Pham0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PhilippaertsPJ22, author = {Pieter Philippaerts and Davy Preuveneers and Wouter Joosen}, title = {OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {460--481}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545955}, doi = {10.1145/3545948.3545955}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/PhilippaertsPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SabahNBC22, author = {Mashael Al Sabah and Mohamed Nabeel and Yazan Boshmaf and Euijin Choo}, title = {Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive {DNS}}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {446--459}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545958}, doi = {10.1145/3545948.3545958}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SabahNBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Schwarz22, author = {Fabian Schwarz}, title = {TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using {ARM} TrustZone}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {56--71}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545961}, doi = {10.1145/3545948.3545961}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Schwarz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SunSRWZ22, author = {Menghan Sun and Zirui Song and Xiaoxi Ren and Daoyuan Wu and Kehuan Zhang}, title = {LiCA: {A} Fine-grained and Path-sensitive Linux Capability Analysis Framework}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {364--379}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545966}, doi = {10.1145/3545948.3545966}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SunSRWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TchanaWB22, author = {Alain Tchana and Lavoisier Lavoisier Wapet and Y{\'{e}}rom{-}David Bromberg}, title = {Odile: {A} scalable tracing tool for non-rooted and on-device Android phones}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {252--262}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545951}, doi = {10.1145/3545948.3545951}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TchanaWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThomaG22, author = {Jan Philipp Thoma and Tim G{\"{u}}neysu}, title = {Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {72--85}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545987}, doi = {10.1145/3545948.3545987}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ThomaG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TorresJS22, author = {Christof Ferreira Torres and Hugo Jonker and Radu State}, title = {Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {115--128}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545975}, doi = {10.1145/3545948.3545975}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/TorresJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/UsuiOKIM22, author = {Toshinori Usui and Yuto Otsuki and Yuhei Kawakoya and Makoto Iwamura and Kanta Matsuura}, title = {Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {380--394}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545969}, doi = {10.1145/3545948.3545969}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/UsuiOKIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangFWZ0Y22, author = {Dabao Wang and Hang Feng and Siwei Wu and Yajin Zhou and Lei Wu and Xingliang Yuan}, title = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of {ERC20} Tokens on Ethereum}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {99--114}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545963}, doi = {10.1145/3545948.3545963}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangFWZ0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangLSL22, author = {Jincheng Wang and Zhuohua Li and Mingshen Sun and John C. S. Lui}, title = {Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {292--307}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545953}, doi = {10.1145/3545948.3545953}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangLSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WeidemanWKZWTMH22, author = {Nicolaas Weideman and Haoda Wang and Tyler Kann and Spencer Zahabizadeh and Wei{-}Cheng Wu and Rajat Tandon and Jelena Mirkovic and Christophe Hauser}, title = {Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {276--291}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545967}, doi = {10.1145/3545948.3545967}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WeidemanWKZWTMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Wolsing0SH22, author = {Konrad Wolsing and Eric Wagner and Antoine Saillard and Martin Henze}, title = {{IPAL:} Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {510--525}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545968}, doi = {10.1145/3545948.3545968}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Wolsing0SH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WonWL22, author = {Jun Yeon Won and Haohuang Wen and Zhiqiang Lin}, title = {What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {200--213}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545957}, doi = {10.1145/3545948.3545957}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WonWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangDMVACRK22, author = {Shuiqiao Yang and Bao Gia Doan and Paul Montague and Olivier Y. de Vel and Tamas Abraham and Seyit Camtepe and Damith C. Ranasinghe and Salil S. Kanhere}, title = {Transferable Graph Backdoor Attack}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {321--332}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545976}, doi = {10.1145/3545948.3545976}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YangDMVACRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YazdaniHHRDSJ22, author = {Ramin Yazdani and Alden Hilton and Jeroen van der Ham and Roland van Rijswijk{-}Deij and Casey T. Deccio and Anna Sperotto and Mattijs Jonker}, title = {Mirrors in the Sky: On the Potential of Clouds in {DNS} Reflection-based Denial-of-Service Attacks}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {263--275}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545959}, doi = {10.1145/3545948.3545959}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YazdaniHHRDSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Zhang00M22, author = {Qingzhao Zhang and Xiao Zhu and Mu Zhang and Z. Morley Mao}, title = {Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {333--349}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545954}, doi = {10.1145/3545948.3545954}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Zhang00M22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangR22, author = {Youqian Zhang and Kasper Rasmussen}, title = {Detection of Electromagnetic Signal Injection Attacks on Actuator Systems}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {171--184}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545949}, doi = {10.1145/3545948.3545949}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2022, title = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948}, doi = {10.1145/3545948}, isbn = {978-1-4503-9704-9}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AberaBGJKS21, author = {Tigist Abera and Ferdinand Brasser and Lachlan J. Gunn and Patrick Jauernig and David Koisser and Ahmad{-}Reza Sadeghi}, editor = {Leyla Bilge and Tudor Dumitras}, title = {GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {220--234}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471868}, doi = {10.1145/3471621.3471868}, timestamp = {Fri, 08 Oct 2021 09:46:25 +0200}, biburl = {https://dblp.org/rec/conf/raid/AberaBGJKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CableGID21, author = {Jack Cable and Drew Mylander Gregory and Liz Izhikevich and Zakir Durumeric}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Stratosphere: Finding Vulnerable Cloud Storage Buckets}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {399--411}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3473500}, doi = {10.1145/3471621.3473500}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CableGID21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CastellanosOCA021, author = {John Henry Castellanos and Mart{\'{\i}}n Ochoa and Alvaro A. C{\'{a}}rdenas and Owen Arden and Jianying Zhou}, editor = {Leyla Bilge and Tudor Dumitras}, title = {AttkFinder: Discovering Attack Vectors in {PLC} Programs using Information Flow Analysis}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {235--250}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471864}, doi = {10.1145/3471621.3471864}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CastellanosOCA021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Chinprutthiwong21, author = {Phakpoom Chinprutthiwong and Raj Vardhan and Guangliang Yang and Yangyong Zhang and Guofei Gu}, editor = {Leyla Bilge and Tudor Dumitras}, title = {The Service Worker Hiding in Your Browser: The Next Web Attack Target?}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {312--323}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471845}, doi = {10.1145/3471621.3471845}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Chinprutthiwong21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DengZX0L21, author = {Gelei Deng and Yuan Zhou and Yuan Xu and Tianwei Zhang and Yang Liu}, editor = {Leyla Bilge and Tudor Dumitras}, title = {An Investigation of Byzantine Threats in Multi-Robot Systems}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {17--32}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471867}, doi = {10.1145/3471621.3471867}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DengZX0L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DingMGSCZ21, author = {Aolin Ding and Praveen Murthy and Luis Garcia and Pengfei Sun and Matthew Chan and Saman A. Zonouz}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {428--441}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471869}, doi = {10.1145/3471621.3471869}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DingMGSCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GDFAS21, author = {Sri Shaila G and Ahmad Darki and Michalis Faloutsos and Nael B. Abu{-}Ghazaleh and Manu Sridharan}, editor = {Leyla Bilge and Tudor Dumitras}, title = {DisCo: Combining Disassemblers for Improved Performance}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {148--161}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471851}, doi = {10.1145/3471621.3471851}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GDFAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GatlinBESLWY21, author = {Jacob Gatlin and Sofia Belikovetsky and Yuval Elovici and Anthony Skjellum and Joshua Lubell and Paul Witherell and Mark Yampolskiy}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {135--147}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471850}, doi = {10.1145/3471621.3471850}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GatlinBESLWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GravaniHCS21, author = {Spyridoula Gravani and Mohammad Hedayati and John Criswell and Michael L. Scott}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Fast Intra-kernel Isolation and Security with IskiOS}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {119--134}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471849}, doi = {10.1145/3471621.3471849}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GravaniHCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Huang0LLD21, author = {Jin Huang and Junjie Zhang and Jialun Liu and Chuang Li and Rui Dai}, editor = {Leyla Bilge and Tudor Dumitras}, title = {UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {78--90}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471859}, doi = {10.1145/3471621.3471859}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Huang0LLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/IfeSMS21, author = {Colin C. Ife and Yun Shen and Steven J. Murdoch and Gianluca Stringhini}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {340--353}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471844}, doi = {10.1145/3471621.3471844}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/IfeSMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiYA021, author = {Tianxi Ji and Emre Yilmaz and Erman Ayday and Pan Li}, editor = {Leyla Bilge and Tudor Dumitras}, title = {The Curse of Correlations for Robust Fingerprinting of Relational Databases}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {412--427}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471853}, doi = {10.1145/3471621.3471853}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/JiYA021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KumarS21, author = {Sandeep Kumar and Smruti R. Sarangi}, editor = {Leyla Bilge and Tudor Dumitras}, title = {SecureFS: {A} Secure File System for Intel {SGX}}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {91--102}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471840}, doi = {10.1145/3471621.3471840}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KumarS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LikajKP21, author = {Xhelal Likaj and Soheil Khodayari and Giancarlo Pellegrino}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Where We Stand (or Fall): An Analysis of {CSRF} Defenses in Web Frameworks}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {370--385}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471846}, doi = {10.1145/3471621.3471846}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LikajKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Liu0DV0FL21, author = {Xuanyu Liu and Qiang Zeng and Xiaojiang Du and Siva Likitha Valluru and Chenglong Fu and Xiao Fu and Bin Luo}, editor = {Leyla Bilge and Tudor Dumitras}, title = {SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {33--47}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471856}, doi = {10.1145/3471621.3471856}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Liu0DV0FL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaierT21, author = {Dominik Christian Maier and Fabian Toepfer}, editor = {Leyla Bilge and Tudor Dumitras}, title = {{BSOD:} Binary-only Scalable fuzzing Of device Drivers}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {48--61}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471863}, doi = {10.1145/3471621.3471863}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaierT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Mi0GB21, author = {Xianya Mi and Sanjay Rawat and Cristiano Giuffrida and Herbert Bos}, editor = {Leyla Bilge and Tudor Dumitras}, title = {LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {62--77}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471852}, doi = {10.1145/3471621.3471852}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Mi0GB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MunteanVLTG021, author = {Paul Muntean and Richard Viehoever and Zhiqiang Lin and Gang Tan and Jens Grossklags and Claudia Eckert}, editor = {Leyla Bilge and Tudor Dumitras}, title = {iTOP: Automating Counterfeit Object-Oriented Programming Attacks}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {162--176}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471847}, doi = {10.1145/3471621.3471847}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MunteanVLTG021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NabeelASKWY21, author = {Mohamed Nabeel and Enes Altinisik and Haipei Sun and Issa Khalil and Wendy Hui Wang and Ting Yu}, editor = {Leyla Bilge and Tudor Dumitras}, title = {{CADUE:} Content-Agnostic Detection of Unwanted Emails for Enterprise Security}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {205--219}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471862}, doi = {10.1145/3471621.3471862}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/NabeelASKWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NisiGFB21, author = {Dario Nisi and Mariano Graziano and Yanick Fratantonio and Davide Balzarotti}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Lost in the Loader: The Many Faces of the Windows {PE} File Format}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {177--192}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471848}, doi = {10.1145/3471621.3471848}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NisiGFB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OngunSOTTNSOP21, author = {Talha Ongun and Jack W. Stokes and Jonathan Bar Or and Ke Tian and Farid Tajaddodianfar and Joshua Neil and Christian Seifert and Alina Oprea and John C. Platt}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Living-Off-The-Land Command Detection Using Active Learning}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {442--455}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471858}, doi = {10.1145/3471621.3471858}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OngunSOTTNSOP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RoesslerAPMPKPB21, author = {Nick Roessler and Lucas Atayde and Imani Palmer and Derrick Paul McKee and Jai Pandey and Vasileios P. Kemerlis and Mathias Payer and Adam Bates and Jonathan M. Smith and Andr{\'{e}} DeHon and Nathan Dautenhahn}, editor = {Leyla Bilge and Tudor Dumitras}, title = {{\(\mu\)}SCOPE: {A} Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {296--311}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471839}, doi = {10.1145/3471621.3471839}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RoesslerAPMPKPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21, author = {Nicola Ruaro and Kyle Zeng and Lukas Dresel and Mario Polino and Tiffany Bao and Andrea Continella and Stefano Zanero and Christopher Kruegel and Giovanni Vigna}, editor = {Leyla Bilge and Tudor Dumitras}, title = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {456--468}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471865}, doi = {10.1145/3471621.3471865}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShermanSR21, author = {Imani N. Sherman and Jack W. Stokes and Elissa M. Redmiles}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Designing Media Provenance Indicators to Combat Fake Media}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {324--339}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471860}, doi = {10.1145/3471621.3471860}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShermanSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TatangZH21, author = {Dennis Tatang and Florian Zettl and Thorsten Holz}, editor = {Leyla Bilge and Tudor Dumitras}, title = {The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {354--369}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471842}, doi = {10.1145/3471621.3471842}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TatangZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThomaFKGB21, author = {Jan Philipp Thoma and Jakob Feldtkeller and Markus Krausz and Tim G{\"{u}}neysu and Daniel J. Bernstein}, editor = {Leyla Bilge and Tudor Dumitras}, title = {BasicBlocker: {ISA} Redesign to Make Spectre-Immune CPUs Faster}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {103--118}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471857}, doi = {10.1145/3471621.3471857}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ThomaFKGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangLWDC21, author = {Junnan Wang and Qixu Liu and Di Wu and Ying Dong and Xiang Cui}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Crafting Adversarial Example to Bypass Flow-{\&}ML- based Botnet Detector via {RL}}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {193--204}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471841}, doi = {10.1145/3471621.3471841}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangLWDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Xu0B21, author = {Yuan Xu and Tianwei Zhang and Yungang Bao}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Analysis and Mitigation of Function Interaction Risks in Robot Apps}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {1--16}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471854}, doi = {10.1145/3471621.3471854}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Xu0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YampolskiyGGSY21, author = {Mark Yampolskiy and Lynne Graves and Jacob Gatlin and Anthony Skjellum and Moti Yung}, editor = {Leyla Bilge and Tudor Dumitras}, title = {What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {266--281}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471843}, doi = {10.1145/3471621.3471843}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YampolskiyGGSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Zhang21, author = {Zicheng Zhang}, editor = {Leyla Bilge and Tudor Dumitras}, title = {On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {386--398}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471625}, doi = {10.1145/3471621.3471625}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Zhang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangASHG21, author = {Yangyong Zhang and Sunpreet S. Arora and Maliheh Shirvanian and Jianwei Huang and Guofei Gu}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Practical Speech Re-use Prevention in Voice-driven Services}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {282--295}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471855}, doi = {10.1145/3471621.3471855}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangASHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangD21, author = {Shaohu Zhang and Anupam Das}, editor = {Leyla Bilge and Tudor Dumitras}, title = {HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic Signal}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {251--265}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471866}, doi = {10.1145/3471621.3471866}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2021, editor = {Leyla Bilge and Tudor Dumitras}, title = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621}, doi = {10.1145/3471621}, isbn = {978-1-4503-9058-3}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0003YLOKR20, author = {Xiaoguang Wang and SengMing Yeoh and Robert Lyerly and Pierre Olivier and Sang{-}Hoon Kim and Binoy Ravindran}, editor = {Manuel Egele and Leyla Bilge}, title = {A Framework for Software Diversification with {ISA} Heterogeneity}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {427--442}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/wang-xiaoguang}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/0003YLOKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0017YL0Z20, author = {Jun Zhao and Qiben Yan and Xudong Liu and Bo Li and Guangsheng Zuo}, editor = {Manuel Egele and Leyla Bilge}, title = {Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {241--256}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/zhao}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/0017YL0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Ah-FatHMBN20, author = {Patrick Ah{-}Fat and Michael Huth and Rob Mead and Tim Burrell and Joshua Neil}, editor = {Manuel Egele and Leyla Bilge}, title = {Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {181--194}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/ah-fat}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Ah-FatHMBN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BhattacharyyaSK20, author = {Atri Bhattacharyya and Andr{\'{e}}s S{\'{a}}nchez and Esmaeil Mohammadian Koruyeh and Nael B. Abu{-}Ghazaleh and Chengyu Song and Mathias Payer}, editor = {Manuel Egele and Leyla Bilge}, title = {SpecROP: Speculative Exploitation of {ROP} Chains}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {1--16}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/bhattacharyya}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BhattacharyyaSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BowmanLJH20, author = {Benjamin Bowman and Craig Laprade and Yuede Ji and H. Howie Huang}, editor = {Manuel Egele and Leyla Bilge}, title = {Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph {AI}}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {257--268}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/bowman}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BowmanLJH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BuyukkayhanGLO020, author = {Ahmet Salih Buyukkayhan and Can Gemicioglu and Tobias Lauinger and Alina Oprea and William Robertson and Engin Kirda}, editor = {Manuel Egele and Leyla Bilge}, title = {What's in an Exploit? An Empirical Analysis of Reflected Server {XSS} Exploitation Techniques}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {107--120}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/buyukkayhan}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BuyukkayhanGLO020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CarminatiSPZ20, author = {Michele Carminati and Luca Santini and Mario Polino and Stefano Zanero}, editor = {Manuel Egele and Leyla Bilge}, title = {Evasion Attacks against Banking Fraud Detection Systems}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {285--300}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/carminati}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CarminatiSPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenAFWL20, author = {Yaohui Chen and Mansour Ahmadi and Reza Mirzazade Farkhani and Boyu Wang and Long Lu}, editor = {Manuel Egele and Leyla Bilge}, title = {{MEUZZ:} Smart Seed Scheduling for Hybrid Fuzzing}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {77--92}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/chen}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChenAFWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChoiKA0X20, author = {Hongjun Choi and Sayali Kate and Yousra Aafer and Xiangyu Zhang and Dongyan Xu}, editor = {Manuel Egele and Leyla Bilge}, title = {Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {349--364}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/choi}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChoiKA0X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DeMarinisWJFK20, author = {Nicholas DeMarinis and Kent Williams{-}King and Di Jin and Rodrigo Fonseca and Vasileios P. Kemerlis}, editor = {Manuel Egele and Leyla Bilge}, title = {sysfilter: Automated System Call Filtering for Commodity Software}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {459--474}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/demarinis}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DeMarinisWJFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FungYB20, author = {Clement Fung and Chris J. M. Yoon and Ivan Beschastnikh}, editor = {Manuel Egele and Leyla Bilge}, title = {The Limitations of Federated Learning in Sybil Settings}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {301--316}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/fung}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FungYB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GhavamniaPBP20, author = {Seyedhamed Ghavamnia and Tapti Palit and Azzedine Benameur and Michalis Polychronakis}, editor = {Manuel Egele and Leyla Bilge}, title = {Confine: Automated System Call Policy Generation for Container Attack Surface Reduction}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {443--458}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/ghavanmnia}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GhavamniaPBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HeXJZ0C20, author = {Yun He and Yihua Xu and Xiaoqi Jia and Shengzhi Zhang and Peng Liu and Shuai Chang}, editor = {Manuel Egele and Leyla Bilge}, title = {EnclavePDP: {A} General Framework to Verify Data Integrity in Cloud Using Intel {SGX}}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {195--208}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/he}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HeXJZ0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HossenTRI0H20, author = {Md. Imran Hossen and Yazhou Tu and Md Fazle Rabby and Md. Nazmul Islam and Hui Cao and Xiali Hei}, editor = {Manuel Egele and Leyla Bilge}, title = {An Object Detection based Solver for Google's Image reCAPTCHA v2}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {269--284}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/hossen}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HossenTRI0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/IbdahLEBM20, author = {Duha Ibdah and Nada Lachtar and Abdulrahman Abu Elkhail and Anys Bacha and Hafiz Malik}, editor = {Manuel Egele and Leyla Bilge}, title = {Dark Firmware: {A} Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {413--426}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/ibdah}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/IbdahLEBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiaTMGSL20, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, editor = {Manuel Egele and Leyla Bilge}, title = {Robust {P2P} Primitives Using {SGX} Enclaves}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {209--224}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/jia}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JiaTMGSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KoishybayevK20, author = {Igibek Koishybayev and Alexandros Kapravelos}, editor = {Manuel Egele and Leyla Bilge}, title = {Mininode: Reducing the Attack Surface of Node.js Applications}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {121--134}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/koishybayev}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KoishybayevK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KozlovYKBFPI20, author = {Fedor Kozlov and Isabella Yuen and Jakub Kowalczyk and Daniel Bernhardt and David Freeman and Paul Pearce and Ivan Ivanov}, editor = {Manuel Egele and Leyla Bilge}, title = {Evaluating Changes to Fake Account Verification Systems}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {135--148}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/kozlov}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KozlovYKBFPI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaierEMH20, author = {Dominik Christian Maier and Henrik Erb and Patrick Mullan and Vincent Haupert}, editor = {Manuel Egele and Leyla Bilge}, title = {Camera Fingerprinting Authentication Revisited}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {31--46}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/maier}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaierEMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ManLG20, author = {Yanmao Man and Ming Li and Ryan M. Gerdes}, editor = {Manuel Egele and Leyla Bilge}, title = {GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {317--332}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/man}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ManLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NguyenBBGL20, author = {Manh{-}Dung Nguyen and S{\'{e}}bastien Bardin and Richard Bonichon and Roland Groz and Matthieu Lemerre}, editor = {Manuel Egele and Leyla Bilge}, title = {Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {47--62}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/nguyen}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NguyenBBGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PalutkeRWF20, author = {Ralph Palutke and Simon Ruderich and Matthias Wild and Felix C. Freiling}, editor = {Manuel Egele and Leyla Bilge}, title = {HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {165--179}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/palutke}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PalutkeRWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PetersonJHCN20, author = {Anthony Peterson and Samuel Jero and Md. Endadul Hoque and David R. Choffnes and Cristina Nita{-}Rotaru}, editor = {Manuel Egele and Leyla Bilge}, title = {aBBRate: Automating {BBR} Attack Exploration Using a Model-Based Approach}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {225--240}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/peterson}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PetersonJHCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RokonIDPF20, author = {Md Omar Faruk Rokon and Risul Islam and Ahmad Darki and Evangelos E. Papalexakis and Michalis Faloutsos}, editor = {Manuel Egele and Leyla Bilge}, title = {SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {149--163}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/omar}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RokonIDPF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Salehi0C20, author = {Majid Salehi and Danny Hughes and Bruno Crispo}, editor = {Manuel Egele and Leyla Bilge}, title = {{\(\mu\)}SBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {381--395}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/salehi}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Salehi0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TakahashiKVYI20, author = {Takeshi Takahashi and Christopher Kruegel and Giovanni Vigna and Katsunari Yoshioka and Daisuke Inoue}, editor = {Manuel Egele and Leyla Bilge}, title = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {93--106}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/takahashi}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TileriaBS20, author = {Marcos Tileria and Jorge Blasco and Guillermo Suarez{-}Tangil}, editor = {Manuel Egele and Leyla Bilge}, title = {WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear {OS}}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {63--75}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/tileria}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TileriaBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ValenzaCA20, author = {Andrea Valenza and Gabriele Costa and Alessandro Armando}, editor = {Manuel Egele and Leyla Bilge}, title = {Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {17--29}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/valenza}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ValenzaCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangC0020, author = {Shu Wang and Jiahao Cao and Kun Sun and Qi Li}, editor = {Manuel Egele and Leyla Bilge}, title = {{SIEVE:} Secure In-Vehicle Automatic Speech Recognition Systems}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {365--379}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/wang-shu}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangC0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WuNKPX20, author = {Jianliang Wu and Yuhong Nan and Vireshwar Kumar and Mathias Payer and Dongyan Xu}, editor = {Manuel Egele and Leyla Bilge}, title = {BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {397--411}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/wu}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WuNKPX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Yang000YD20, author = {Zeyu Yang and Liang He and Peng Cheng and Jiming Chen and David K. Y. Yau and Linkang Du}, editor = {Manuel Egele and Leyla Bilge}, title = {PLC-Sleuth: Detecting and Localizing {PLC} Intrusions Using Control Invariants}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {333--348}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/yang}, timestamp = {Tue, 09 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Yang000YD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2020, editor = {Manuel Egele and Leyla Bilge}, title = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020}, isbn = {978-1-939133-18-2}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0001HKSGA19, author = {Daiki Chiba and Ayako Akiyama Hasegawa and Takashi Koide and Yuta Sawabe and Shigeki Goto and Mitsuaki Akiyama}, title = {DomainScouter: Understanding the Risks of Deceptive IDNs}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {413--426}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/chiba}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/0001HKSGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AbdoMQZBA19, author = {Ahmed Abdo and Sakib Md. Bin Malek and Zhiyun Qian and Qi Zhu and Matthew J. Barth and Nael B. Abu{-}Ghazaleh}, title = {Application level attacks on Connected Vehicle Protocols}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {459--471}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/abdo}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/AbdoMQZBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Ali-GombeSCR19, author = {Aisha I. Ali{-}Gombe and Sneha Sudhakaran and Andrew Case and Golden G. Richard III}, title = {DroidScraper: {A} Tool for Android In-Memory Object Recovery and Reconstruction}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {547--559}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/ali-gombe}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Ali-GombeSCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AydayYY19, author = {Erman Ayday and Emre Yilmaz and Arif Yilmaz}, title = {Robust Optimization-Based Watermarking Scheme for Sequential Data}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {323--336}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/ayday}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/AydayYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AzarFKRHDGS19, author = {Kimia Zamiri Azar and Farnoud Farahmand and Hadi Mardani Kamali and Shervin Roshanisefat and Houman Homayoun and William Diehl and Kris Gaj and Avesta Sasan}, title = {{COMA:} Communication and Obfuscation Management Architecture}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {181--195}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/azar}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/AzarFKRHDGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BarronMN19, author = {Timothy Barron and Najmeh Miramirkhani and Nick Nikiforakis}, title = {Now You See It, Now You Don't: {A} Large-scale Analysis of Early Domain Deletions}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {383--397}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/barron}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BarronMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaoYS0XH19, author = {Jiahao Cao and Zijie Yang and Kun Sun and Qi Li and Mingwei Xu and Peiyi Han}, title = {Fingerprinting {SDN} Applications via Encrypted Control Traffic}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {501--515}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/cao}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CaoYS0XH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChengHLZLLR19, author = {Zhen Cheng and Xinrui Hou and Runhuai Li and Yajin Zhou and Xiapu Luo and Jinku Li and Kui Ren}, title = {Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {47--60}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/cheng}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ChengHLZLLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungLTZKIK19, author = {Key{-}whan Chung and Xiao Li and Peicheng Tang and Zeran Zhu and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Thenkurussi Kesavadas}, title = {Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {337--351}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/chung}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ChungLTZKIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DavanianQQY19, author = {Ali Davanian and Zhenxiao Qi and Yu Qu and Heng Yin}, title = {{DECAF++:} Elastic Whole-System Dynamic Taint Analysis}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {31--45}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/davanian}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/DavanianQQY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019, author = {Wenrui Diao and Yue Zhang and Li Zhang and Zhou Li and Fenghao Xu and Xiaorui Pan and Xiangyu Liu and Jian Weng and Kehuan Zhang and XiaoFeng Wang}, title = {Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {261--275}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/diao}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DuanGHY19, author = {Yue Duan and Lian Gao and Jie Hu and Heng Yin}, title = {Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {277--292}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/duan}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/DuanGHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ErinfolamiQP19, author = {Rukayat Ayomide Erinfolami and Anh Quach and Aravind Prakash}, title = {On Design Inference from Binaries Compiled using Modern {C++} Defenses}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {15--30}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/erinfolami}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ErinfolamiQP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GhaeiniCBBG0STZ19, author = {Hamid Reza Ghaeini and Matthew Chan and Raad Bahmani and Ferdinand Brasser and Luis Garcia and Jianying Zhou and Ahmad{-}Reza Sadeghi and Nils Ole Tippenhauer and Saman A. Zonouz}, title = {PAtt: Physics-based Attestation of Control Systems}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {165--180}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/ghaeini}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GhaeiniCBBG0STZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GhietteGD19, author = {Vincent Ghi{\"{e}}tte and Harm Griffioen and Christian Doerr}, title = {Fingerprinting Tooling used for {SSH} Compromisation Attempts}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {61--71}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/ghiette}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GhietteGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GustafsonMSRMFB19, author = {Eric Gustafson and Marius Muench and Chad Spensky and Nilo Redini and Aravind Machiry and Yanick Fratantonio and Davide Balzarotti and Aur{\'{e}}lien Francillon and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {Toward the Analysis of Embedded Firmware through Automated Re-hosting}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {135--150}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/gustafson}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GustafsonMSRMFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/IacovazziFE19, author = {Alfonso Iacovazzi and Daniel Frassinelli and Yuval Elovici}, title = {The {DUSTER} Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {213--225}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/iacovazzi}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/IacovazziFE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KharrazDB0K19, author = {Amin Kharraz and Brandon L. Daley and Graham Z. Baker and William Robertson and Engin Kirda}, title = {{USBESAFE:} An End-Point Solution to Protect Against USB-Based Attacks}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {89--103}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/kharraz}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/KharrazDB0K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiD0RME19, author = {Richard Li and Min Du and David Johnson and Robert Ricci and Jacobus E. van der Merwe and Eric Eide}, title = {Fluorescence: Detecting Kernel-Resident Malware in Clouds}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {367--382}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/li-richard}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiD0RME19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LinN19, author = {Chih{-}Yuan Lin and Simin Nadjm{-}Tehrani}, title = {Timing Patterns and Correlations in Spontaneous {SCADA} Traffic for Anomaly Detection}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {73--88}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/lin}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LinN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuoSXW19, author = {Wu Luo and Qingni Shen and Yutang Xia and Zhonghai Wu}, title = {Container-IMA: {A} privacy-preserving Integrity Measurement Architecture for Containers}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {487--500}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/luo}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LuoSXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NisiBF19, author = {Dario Nisi and Antonio Bianchi and Yanick Fratantonio}, title = {Exploring Syscall-Based Semantics Reconstruction of Android Applications}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {517--531}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/nisi}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/NisiBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SaburCHKKV19, author = {Abdulhakim Sabur and Ankur Chowdhary and Dijiang Huang and Myong H. Kang and Anya Kim and Alexander Velazquez}, title = {{S3:} {A} DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {473--485}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/sabur}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SaburCHKKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SivanBS19, author = {Nir Sivan and Ron Bitton and Asaf Shabtai}, title = {Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {243--260}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/sivan}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SivanBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SolomosIIK19, author = {Konstantinos Solomos and Panagiotis Ilia and Sotiris Ioannidis and Nicolas Kourtellis}, title = {{TALON:} An Automated Framework for Cross-Device Tracking Detection}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {227--241}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/solomos}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SolomosIIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SongL19, author = {Wei Song and Peng Liu}, title = {Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the {LLC}}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {427--442}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/song}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SongL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SunTYLL19, author = {Xiaoqing Sun and Mingkai Tong and Jiahai Yang and Xinran Liu and Heng Liu}, title = {HinDom: {A} Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {399--412}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/sun}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SunTYLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ToffaliniLB0C19, author = {Flavio Toffalini and Eleonora Losiouk and Andrea Biondo and Jianying Zhou and Mauro Conti}, title = {ScaRR: Scalable Runtime Remote Attestation for Complex Systems}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {121--134}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/toffalini}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ToffaliniLB0C19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TopleJS19, author = {Shruti Tople and Yaoqi Jia and Prateek Saxena}, title = {{PRO-ORAM:} Practical Read-Only Oblivious {RAM}}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {197--211}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/tople}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/TopleJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangDSYS19, author = {Jinghan Wang and Yue Duan and Wei Song and Heng Yin and Chengyu Song}, title = {Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {1--15}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/wang}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangDSYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangMZLMMCG19, author = {Jianqiang Wang and Siqi Ma and Yuanyuan Zhang and Juanru Li and Zheyu Ma and Long Mai and Tiancheng Chen and Dawu Gu}, title = {{NLP-EYE:} Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {309--321}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/wang-0}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangMZLMMCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangZL19, author = {Wubing Wang and Yinqian Zhang and Zhiqiang Lin}, title = {Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {443--457}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/wang-wubing}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WeiserMSG19, author = {Samuel Weiser and Luca Mayr and Michael Schwarz and Daniel Gruss}, title = {SGXJail: Defeating Enclave Malware via Confinement}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {353--366}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/weiser}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WeiserMSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YuanHY0Z19, author = {Lun{-}Pin Yuan and Wenjun Hu and Ting Yu and Peng Liu and Sencun Zhu}, title = {Towards Large-Scale Hunting for Android Negative-Day Malware}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {533--545}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/yuan}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YuanHY0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangCDGWZ19, author = {Li Zhang and Jiongyi Chen and Wenrui Diao and Shanqing Guo and Jian Weng and Kehuan Zhang}, title = {CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {151--164}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/zhang-li}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangCDGWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhaoZQFF19, author = {Shijun Zhao and Qianying Zhang and Yu Qin and Wei Feng and Dengguo Feng}, title = {Minimal Kernel: An Operating System Architecture for {TEE} to Resist Board Level Physical Attacks}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {105--120}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/zhao}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhaoZQFF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZuoYL019, author = {Fei Zuo and Bokai Yang and Xiaopeng Li and Qiang Zeng}, title = {Exploiting the Inherent Limitation of {L0} Adversarial Examples}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {293--307}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/zuo}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZuoYL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2019, title = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0007MFS18, author = {Jens M{\"{u}}ller and Vladislav Mladenov and Dennis Felsch and J{\"{o}}rg Schwenk}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {PostScript Undead: Pwning the Web with a 35 Years Old Language}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {603--622}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_28}, doi = {10.1007/978-3-030-00470-5\_28}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/0007MFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0017DG18, author = {Kang Liu and Brendan Dolan{-}Gavitt and Siddharth Garg}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {273--294}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_13}, doi = {10.1007/978-3-030-00470-5\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/0017DG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BellevilleMSHNJ18, author = {Brian Belleville and Hyungon Moon and Jangseop Shin and Dongil Hwang and Joseph M. Nash and Seonhwa Jung and Yeoul Na and Stijn Volckaert and Per Larsen and Yunheung Paek and Michael Franz}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Hardware Assisted Randomization of Data}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {337--358}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_16}, doi = {10.1007/978-3-030-00470-5\_16}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BellevilleMSHNJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BockVMK18, author = {Leon B{\"{o}}ck and Emmanouil Vasilomanolakis and Max M{\"{u}}hlh{\"{a}}user and Shankar Karuppayah}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Next Generation {P2P} Botnets: Monitoring Under Adverse Conditions}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {511--531}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_24}, doi = {10.1007/978-3-030-00470-5\_24}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BockVMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BrengelR18, author = {Michael Brengel and Christian Rossow}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Identifying Key Leakage of Bitcoin Users}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {623--643}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_29}, doi = {10.1007/978-3-030-00470-5\_29}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BrengelR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BushartR18, author = {Jonas Bushart and Christian Rossow}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {{DNS} Unchained: Amplified Application-Layer DoS Attacks Against {DNS} Authoritatives}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {139--160}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_7}, doi = {10.1007/978-3-030-00470-5\_7}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BushartR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BushouseR18, author = {Micah Bushouse and Douglas S. Reeves}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Furnace: Self-service Tenant {VMI} for the Cloud}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {647--669}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_30}, doi = {10.1007/978-3-030-00470-5\_30}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BushouseR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaoGZGLLLXL18, author = {Chen Cao and Le Guan and Ning Zhang and Neng Gao and Jingqiang Lin and Bo Luo and Peng Liu and Ji Xiang and Wenjing Lou}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {CryptMe: Data Leakage Prevention for Unmodified Programs on {ARM} Devices}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {380--400}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_18}, doi = {10.1007/978-3-030-00470-5\_18}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CaoGZGLLLXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CristalliVBL18, author = {Stefano Cristalli and Edoardo Vignati and Danilo Bruschi and Andrea Lanzi}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {445--464}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_21}, doi = {10.1007/978-3-030-00470-5\_21}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CristalliVBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GasconUSR18, author = {Hugo Gascon and Steffen Ullrich and Benjamin Stritter and Konrad Rieck}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {69--91}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_4}, doi = {10.1007/978-3-030-00470-5\_4}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GasconUSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LettnerSPLVF18, author = {Julian Lettner and Dokyung Song and Taemin Park and Per Larsen and Stijn Volckaert and Michael Franz}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {403--422}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_19}, doi = {10.1007/978-3-030-00470-5\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LettnerSPLVF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MehnazMB18, author = {Shagufta Mehnaz and Anand Mudgerikar and Elisa Bertino}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {RWGuard: {A} Real-Time Detection System Against Cryptographic Ransomware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {114--136}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_6}, doi = {10.1007/978-3-030-00470-5\_6}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MehnazMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MogosanuRD18, author = {Lucian Mogosanu and Ashay Rane and Nathan Dautenhahn}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {MicroStache: {A} Lightweight Execution Context for In-Process Safe Region Isolation}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {359--379}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_17}, doi = {10.1007/978-3-030-00470-5\_17}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MogosanuRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MorgnerPSB18, author = {Philipp Morgner and Stefan Pfennig and Dennis Salzner and Zinaida Benenson}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Malicious IoT Implants: Tampering with Serial Communication over the Internet}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {535--555}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_25}, doi = {10.1007/978-3-030-00470-5\_25}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MorgnerPSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MunteanFTLGE18, author = {Paul Muntean and Matthias Fischer and Gang Tan and Zhiqiang Lin and Jens Grossklags and Claudia Eckert}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {{\(\tau\)}CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {423--444}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_20}, doi = {10.1007/978-3-030-00470-5\_20}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MunteanFTLGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PapadogiannakiH18, author = {Eva Papadogiannaki and Constantinos Halevidis and Periklis Akritidis and Lazaros Koromilas}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {OTTer: {A} Scalable High-Resolution Encrypted Traffic Identification Engine}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {315--334}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_15}, doi = {10.1007/978-3-030-00470-5\_15}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PapadogiannakiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PastranaHCB18, author = {Sergio Pastrana and Alice Hutchings and Andrew Caines and Paula Buttery}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {207--227}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_10}, doi = {10.1007/978-3-030-00470-5\_10}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PastranaHCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PereiraCYCN18, author = {Mayana Pereira and Shaun Coleman and Bin Yu and Martine De Cock and Anderson C. A. Nascimento}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive {DNS} Traffic}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {295--314}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_14}, doi = {10.1007/978-3-030-00470-5\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PereiraCYCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RizzoCK18, author = {Claudio Rizzo and Lorenzo Cavallaro and Johannes Kinder}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {25--46}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_2}, doi = {10.1007/978-3-030-00470-5\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RizzoCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RosenbergSRE18, author = {Ishai Rosenberg and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Generic Black-Box End-to-End Attack Against State of the Art {API} Call Based Malware Classifiers}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {490--510}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_23}, doi = {10.1007/978-3-030-00470-5\_23}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RosenbergSRE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SahinCE18, author = {Onur Sahin and Ayse K. Coskun and Manuel Egele}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Proteus: Detecting Android Emulators from Instruction-Level Profiles}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {3--24}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_1}, doi = {10.1007/978-3-030-00470-5\_1}, timestamp = {Tue, 23 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SahinCE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShiCLLHS18, author = {Bin Shi and Lei Cui and Bo Li and Xudong Liu and Zhiyu Hao and Haiying Shen}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {670--690}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_31}, doi = {10.1007/978-3-030-00470-5\_31}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShiCLLHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TatarGBR18, author = {Andrei Tatar and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Defeating Software Mitigations Against Rowhammer: {A} Surgical Precision Hammer}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {47--66}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_3}, doi = {10.1007/978-3-030-00470-5\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TatarGBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThomasF18, author = {Sam L. Thomas and Aur{\'{e}}lien Francillon}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Backdoors: Definition, Deniability and Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {92--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_5}, doi = {10.1007/978-3-030-00470-5\_5}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ThomasF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/UllrichSJDW18, author = {Johanna Ullrich and Nicholas Stifter and Aljosha Judmayer and Adrian Dabrowski and Edgar R. Weippl}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {184--203}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_9}, doi = {10.1007/978-3-030-00470-5\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/UllrichSJDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VervierS18, author = {Pierre{-}Antoine Vervier and Yun Shen}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Before Toasters Rise Up: {A} View into the Emerging IoT Threat Landscape}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {556--576}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_26}, doi = {10.1007/978-3-030-00470-5\_26}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VervierS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangZG18, author = {Binghui Wang and Le Zhang and Neil Zhenqiang Gong}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {228--249}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_11}, doi = {10.1007/978-3-030-00470-5\_11}, timestamp = {Thu, 10 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WooM18, author = {Simon S. Woo and Jelena Mirkovic}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {GuidedPass: Helping Users to Create Strong and Memorable Passwords}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {250--270}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_12}, doi = {10.1007/978-3-030-00470-5\_12}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WooM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YunHLAK18, author = {Jeong{-}Han Yun and Yoonho Hwang and Woomyo Lee and Hee{-}Kap Ahn and Sin{-}Kyu Kim}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {577--599}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_27}, doi = {10.1007/978-3-030-00470-5\_27}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YunHLAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangCNLSR18, author = {Zhi Zhang and Yueqiang Cheng and Surya Nepal and Dongxi Liu and Qingni Shen and Fethi A. Rabhi}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {{KASR:} {A} Reliable and Practical Approach to Attack Surface Reduction of Commodity {OS} Kernels}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {691--710}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_32}, doi = {10.1007/978-3-030-00470-5\_32}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangCNLSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangJGS018, author = {Jialong Zhang and Jiyong Jang and Guofei Gu and Marc Ph. Stoecklin and Xin Hu}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Error-Sensor: Mining Information from {HTTP} Error Traffic for Malware Intelligence}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {467--489}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_22}, doi = {10.1007/978-3-030-00470-5\_22}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangJGS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangLXBGB18, author = {Menghao Zhang and Guanyu Li and Lei Xu and Jun Bi and Guofei Gu and Jiasong Bai}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {161--183}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_8}, doi = {10.1007/978-3-030-00470-5\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangLXBGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2018, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5}, doi = {10.1007/978-3-030-00470-5}, isbn = {978-3-030-00469-9}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlepisP17, author = {Efthimios Alepis and Constantinos Patsakis}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Trapped by the {UI:} The Android Case}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {334--354}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_15}, doi = {10.1007/978-3-319-66332-6\_15}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/AlepisP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BeaugnonCB17, author = {Ana{\"{e}}l Beaugnon and Pierre Chifflier and Francis R. Bach}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {{ILAB:} An Interactive Labelling Strategy for Intrusion Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {120--140}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_6}, doi = {10.1007/978-3-319-66332-6\_6}, timestamp = {Mon, 09 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BeaugnonCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BuyukkayhanOLR17, author = {Ahmet Salih Buyukkayhan and Alina Oprea and Zhou Li and William K. Robertson}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {73--97}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_4}, doi = {10.1007/978-3-319-66332-6\_4}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BuyukkayhanOLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenK017, author = {Yue Chen and Mustakimur Khandaker and Zhi Wang}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Secure In-Cache Execution}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {381--402}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_17}, doi = {10.1007/978-3-319-66332-6\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChenK017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenLMWWZ17, author = {Kai Chen and Tongxin Li and Bin Ma and Peng Wang and XiaoFeng Wang and Peiyuan Zong}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Filtering for Malice Through the Data Ocean: Large-Scale {PHA} Install Detection at the Communication Service Provider Level}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {167--191}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_8}, doi = {10.1007/978-3-319-66332-6\_8}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ChenLMWWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ElsabaghFSKB17, author = {Mohamed Elsabagh and Dan Fleck and Angelos Stavrou and Michael Kaplan and Thomas Bowen}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Practical and Accurate Runtime Application Protection Against DoS Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {450--471}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_20}, doi = {10.1007/978-3-319-66332-6\_20}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ElsabaghFSKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FereidooniCSPMS17, author = {Hossein Fereidooni and Jiska Classen and Tom Spink and Paul Patras and Markus Miettinen and Ahmad{-}Reza Sadeghi and Matthias Hollick and Mauro Conti}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {48--69}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_3}, doi = {10.1007/978-3-319-66332-6\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FereidooniCSPMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FuBQL17, author = {Yangchun Fu and Erick Bauman and Raul Quinonez and Zhiqiang Lin}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {357--380}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_16}, doi = {10.1007/978-3-319-66332-6\_16}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FuBQL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GensASLJS17, author = {David Gens and Orlando Arias and Dean Sullivan and Christopher Liebchen and Yier Jin and Ahmad{-}Reza Sadeghi}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {{LAZARUS:} Practical Side-Channel Resilient Kernel-Space Randomization}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {238--258}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_11}, doi = {10.1007/978-3-319-66332-6\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GensASLJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HendersonYJH017, author = {Andrew Henderson and Heng Yin and Guang Jin and Hao Han and Hongmei Deng}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {{VDF:} Targeted Evolutionary Fuzz Testing of Virtual Devices}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {3--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_1}, doi = {10.1007/978-3-319-66332-6\_1}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/HendersonYJH017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JeroBNOSF17, author = {Samuel Jero and Xiangyu Bu and Cristina Nita{-}Rotaru and Hamed Okhravi and Richard Skowyra and Sonia Fahmy}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {{BEADS:} Automated Attack Discovery in OpenFlow-Based {SDN} Systems}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {311--333}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_14}, doi = {10.1007/978-3-319-66332-6\_14}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JeroBNOSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KawakoyaSOIY17, author = {Yuhei Kawakoya and Eitaro Shioji and Yuto Otsuki and Makoto Iwamura and Takeshi Yada}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Stealth Loader: Trace-Free Program Loading for {API} Obfuscation}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {217--237}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_10}, doi = {10.1007/978-3-319-66332-6\_10}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KawakoyaSOIY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KharrazK17, author = {Amin Kharraz and Engin Kirda}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Redemption: Real-Time Protection Against Ransomware at End-Hosts}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {98--119}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_5}, doi = {10.1007/978-3-319-66332-6\_5}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KharrazK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruppKRM017, author = {Johannes Krupp and Mohammad Karami and Christian Rossow and Damon McCoy and Michael Backes}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Linking Amplification DDoS Attacks to Booter Services}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {427--449}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_19}, doi = {10.1007/978-3-319-66332-6\_19}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KruppKRM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LeachZW17, author = {Kevin Leach and Fengwei Zhang and Westley Weimer}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {403--424}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_18}, doi = {10.1007/978-3-319-66332-6\_18}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LeachZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiJHO17, author = {Yuping Li and Jiyong Jang and Xin Hu and Xinming Ou}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Android Malware Clustering Through Malicious Payload Mining}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {192--214}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_9}, doi = {10.1007/978-3-319-66332-6\_9}, timestamp = {Thu, 14 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LiJHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NymanEDA17, author = {Thomas Nyman and Jan{-}Erik Ekberg and Lucas Davi and N. Asokan}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {{CFI} CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {259--284}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_12}, doi = {10.1007/978-3-319-66332-6\_12}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NymanEDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShastryLFTYRSSF17, author = {Bhargava Shastry and Markus Leutner and Tobias Fiebig and Kashyap Thimmaraju and Fabian Yamaguchi and Konrad Rieck and Stefan Schmid and Jean{-}Pierre Seifert and Anja Feldmann}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Static Program Analysis as a Fuzzing Aid}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {26--47}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_2}, doi = {10.1007/978-3-319-66332-6\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShastryLFTYRSSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TahirHDAGZCB17, author = {Rashid Tahir and Muhammad Huzaifa and Anupam Das and Mohammad Ahmad and Carl A. Gunter and Fareed Zaffar and Matthew Caesar and Nikita Borisov}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {287--310}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_13}, doi = {10.1007/978-3-319-66332-6\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TahirHDAGZCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VissersSAJJWPJD17, author = {Thomas Vissers and Jan Spooren and Pieter Agten and Dirk Jumpertz and Peter Janssen and Marc Van Wesemael and Frank Piessens and Wouter Joosen and Lieven Desmet}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Exploring the Ecosystem of Malicious Domain Registrations in the .eu {TLD}}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {472--493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_21}, doi = {10.1007/978-3-319-66332-6\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VissersSAJJWPJD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangMZG17, author = {Guangliang Yang and Abner Mendoza and Jialong Zhang and Guofei Gu}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {143--166}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_7}, doi = {10.1007/978-3-319-66332-6\_7}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YangMZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2017, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6}, doi = {10.1007/978-3-319-66332-6}, isbn = {978-3-319-66331-9}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0001HRRSS16, author = {Michael Backes and Thorsten Holz and Christian Rossow and Teemu Rytilahti and Milivoj Simeonovski and Ben Stock}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the Feasibility of TTL-Based Filtering for DRDoS Mitigation}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {303--322}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_14}, doi = {10.1007/978-3-319-45719-2\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/0001HRRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ArshadKR16, author = {Sajjad Arshad and Amin Kharraz and William Robertson}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {415--436}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_19}, doi = {10.1007/978-3-319-45719-2\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ArshadKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BlackthorneKY16, author = {Jeremy Blackthorne and Benjamin Kaiser and B{\"{u}}lent Yener}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Formal Framework for Environmentally Sensitive Malware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {211--229}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_10}, doi = {10.1007/978-3-319-45719-2\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BlackthorneKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BozzatoFPS16, author = {Claudio Bozzato and Riccardo Focardi and Francesco Palmarini and Graham Steel}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {APDU-Level Attacks in PKCS{\#}11 Devices}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {97--117}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_5}, doi = {10.1007/978-3-319-45719-2\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BozzatoFPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CallejaTC16, author = {Alejandro Calleja and Juan E. Tapiador and Juan Caballero}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Look into 30 Years of Malware Development from a Software Metrics Perspective}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {325--345}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_15}, doi = {10.1007/978-3-319-45719-2\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CallejaTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DabrowskiPW16, author = {Adrian Dabrowski and Georg Petzl and Edgar R. Weippl}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {The Messenger Shoots Back: Network Operator Based {IMSI} Catcher Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {279--302}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_13}, doi = {10.1007/978-3-319-45719-2\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/DabrowskiPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FuRLL0J16, author = {Yangchun Fu and Junghwan Rhee and Zhiqiang Lin and Zhichun Li and Hui Zhang and Guofei Jiang}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Detecting Stack Layout Corruptions with Robust Stack Unwinding}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {71--94}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_4}, doi = {10.1007/978-3-319-45719-2\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FuRLL0J16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HuPWZCY16, author = {Xunchao Hu and Aravind Prakash and Jinghan Wang and Rundong Zhou and Yao Cheng and Heng Yin}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {254--276}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_12}, doi = {10.1007/978-3-319-45719-2\_12}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/HuPWZCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KoromilasVAI16, author = {Lazaros Koromilas and Giorgos Vasiliadis and Elias Athanasopoulos and Sotiris Ioannidis}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{GRIM:} Leveraging GPUs for Kernel Integrity Monitoring}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {3--23}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_1}, doi = {10.1007/978-3-319-45719-2\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/KoromilasVAI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KountourasKLCND16, author = {Athanasios Kountouras and Panagiotis Kintis and Chaz Lever and Yizheng Chen and Yacin Nadji and David Dagon and Manos Antonakakis and Rodney Joffe}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Enabling Network Security Through Active {DNS} Datasets}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {188--208}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_9}, doi = {10.1007/978-3-319-45719-2\_9}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KountourasKLCND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16, author = {Andrea Mambretti and Kaan Onarlioglu and Collin Mulliner and William Robertson and Engin Kirda and Federico Maggi and Stefano Zanero}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Trellis: Privilege Separation for Multi-user Applications Made Easy}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {437--456}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_20}, doi = {10.1007/978-3-319-45719-2\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MuenchPSKVB16, author = {Marius Muench and Fabio Pagani and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna and Davide Balzarotti}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {24--48}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_2}, doi = {10.1007/978-3-319-45719-2\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MuenchPSKVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NoroozianKGMYE16, author = {Arman Noroozian and Maciej Korczynski and Carlos Hernandez Ga{\~{n}}{\'{a}}n and Daisuke Makita and Katsunari Yoshioka and Michel van Eeten}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {368--389}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_17}, doi = {10.1007/978-3-319-45719-2\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NoroozianKGMYE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PellegrinoCBR16, author = {Giancarlo Pellegrino and Onur Catakoglu and Davide Balzarotti and Christian Rossow}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Uses and Abuses of Server-Side Requests}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {393--414}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_18}, doi = {10.1007/978-3-319-45719-2\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PellegrinoCBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SebastianRKC16, author = {Marcos Sebasti{\'{a}}n and Richard Rivera and Platon Kotzias and Juan Caballero}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {AVclass: {A} Tool for Massive Malware Labeling}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {230--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_11}, doi = {10.1007/978-3-319-45719-2\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SebastianRKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SunLZ16, author = {Mingshen Sun and John C. S. Lui and Yajin Zhou}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Blender: Self-randomizing Address Space Layout for Android Apps}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {457--480}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_21}, doi = {10.1007/978-3-319-45719-2\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SunLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThomasABFHBBB16, author = {Kurt Thomas and Rony Amira and Adi Ben{-}Yoash and Ori Folger and Amir Hardon and Ari Berger and Elie Bursztein and Michael D. Bailey}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {143--164}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_7}, doi = {10.1007/978-3-319-45719-2\_7}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ThomasABFHBBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YokoyamaITPYMKI16, author = {Akira Yokoyama and Kou Ishii and Rui Tanabe and Yinmin Papa and Katsunari Yoshioka and Tsutomu Matsumoto and Takahiro Kasama and Daisuke Inoue and Michael Brengel and Michael Backes and Christian Rossow}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {165--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_8}, doi = {10.1007/978-3-319-45719-2\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YokoyamaITPYMKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZengFL16, author = {Junyuan Zeng and Yangchun Fu and Zhiqiang Lin}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Automatic Uncovering of Tap Points from Kernel Executions}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {49--70}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_3}, doi = {10.1007/978-3-319-45719-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZengFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangZL16, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {CloudRadar: {A} Real-Time Side-Channel Attack Detection System in Clouds}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {118--140}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_6}, doi = {10.1007/978-3-319-45719-2\_6}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhauniarovichG16, author = {Yury Zhauniarovich and Olga Gadyatskaya}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Small Changes, Big Changes: An Updated View on the Android Permission System}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {346--367}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_16}, doi = {10.1007/978-3-319-45719-2\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhauniarovichG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2016, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2}, doi = {10.1007/978-3-319-45719-2}, isbn = {978-3-319-45718-5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AmannS15, author = {Johanna Amann and Robin Sommer}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Providing Dynamic Control to Passive Network Security Monitoring}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {133--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_7}, doi = {10.1007/978-3-319-26362-5\_7}, timestamp = {Sun, 25 Oct 2020 22:56:09 +0100}, biburl = {https://dblp.org/rec/conf/raid/AmannS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AndronioZM15, author = {Nicol{\'{o}} Andronio and Stefano Zanero and Federico Maggi}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {HelDroid: Dissecting and Detecting Mobile Ransomware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {382--404}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_18}, doi = {10.1007/978-3-319-26362-5\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AndronioZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaraboschDYG15, author = {Thomas Barabosch and Adrian Dombeck and Khaled Yakdan and Elmar Gerhards{-}Padilla}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {BotWatcher - Transparent and Generic Botnet Tracking}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {565--587}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_26}, doi = {10.1007/978-3-319-26362-5\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaraboschDYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenBWBP15, author = {Yangyi Chen and Vincent Bindschaedler and XiaoFeng Wang and Stefan Berger and Dimitrios E. Pendarakis}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {588--614}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_27}, doi = {10.1007/978-3-319-26362-5\_27}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChenBWBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ElsabaghBFS15, author = {Mohamed Elsabagh and Daniel Barbar{\'{a}} and Dan Fleck and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {515--537}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_24}, doi = {10.1007/978-3-319-26362-5\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ElsabaghBFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GerdesM15, author = {Ryan M. Gerdes and Saptarshi Mallick}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Physical-Layer Detection of Hardware Keyloggers}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {26--47}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_2}, doi = {10.1007/978-3-319-26362-5\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GerdesM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JacquemartVUB15, author = {Quentin Jacquemart and Pierre{-}Antoine Vervier and Guillaume Urvoy{-}Keller and Ernst W. Biersack}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Demystifying the {IP} Blackspace}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {111--132}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_6}, doi = {10.1007/978-3-319-26362-5\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JacquemartVUB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KhasawnehODAP15, author = {Khaled N. Khasawneh and Meltem Ozsoy and Caleb Donovick and Nael B. Abu{-}Ghazaleh and Dmitry V. Ponomarev}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Ensemble Learning for Low-Level Hardware-Supported Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {3--25}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_1}, doi = {10.1007/978-3-319-26362-5\_1}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KhasawnehODAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KittelVKE15, author = {Thomas Kittel and Sebastian Vogl and Julian Kirsch and Claudia Eckert}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Counteracting Data-Only Malware with Code Pointer Examination}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {177--197}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_9}, doi = {10.1007/978-3-319-26362-5\_9}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/KittelVKE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KramerKMNKYR15, author = {Lukas Kr{\"{a}}mer and Johannes Krupp and Daisuke Makita and Tomomi Nishizoe and Takashi Koide and Katsunari Yoshioka and Christian Rossow}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {AmpPot: Monitoring and Defending Against Amplification DDoS Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {615--636}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_28}, doi = {10.1007/978-3-319-26362-5\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KramerKMNKYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaoCTG15, author = {Weixuan Mao and Zhongmin Cai and Don Towsley and Xiaohong Guan}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Probabilistic Inference on Integrity for Access Behavior Based Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {155--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_8}, doi = {10.1007/978-3-319-26362-5\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaoCTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MauriceSNHF15, author = {Cl{\'{e}}mentine Maurice and Nicolas Le Scouarnec and Christoph Neumann and Olivier Heen and Aur{\'{e}}lien Francillon}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {48--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_3}, doi = {10.1007/978-3-319-26362-5\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MauriceSNHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MilenkoskiPAVKA15, author = {Aleksandar Milenkoski and Bryan D. Payne and Nuno Antunes and Marco Vieira and Samuel Kounev and Alberto Avritzer and Matthias Luft}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {471--492}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_22}, doi = {10.1007/978-3-319-26362-5\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MilenkoskiPAVKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MurmuriaSBF15, author = {Rahul Murmuria and Angelos Stavrou and Daniel Barbar{\'{a}} and Dan Fleck}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {405--424}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_19}, doi = {10.1007/978-3-319-26362-5\_19}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MurmuriaSBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NamJCHP15, author = {Jaehyun Nam and Muhammad Jamshed and Byungkwon Choi and Dongsu Han and KyoungSoo Park}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {89--110}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_5}, doi = {10.1007/978-3-319-26362-5\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NamJCHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NieSLWYHF15, author = {Meining Nie and Purui Su and Qi Li and Zhi Wang and Lingyun Ying and Jinlong Hu and Dengguo Feng}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Xede: Practical Exploit Early Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {198--221}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_10}, doi = {10.1007/978-3-319-26362-5\_10}, timestamp = {Wed, 24 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/NieSLWYHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PellegrinoTBR15, author = {Giancarlo Pellegrino and Constantin Tsch{\"{u}}rtz and Eric Bodden and Christian Rossow}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {j{\"{A}}k: Using Dynamic Analysis to Crawl and Test Modern Web Applications}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {295--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_14}, doi = {10.1007/978-3-319-26362-5\_14}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PellegrinoTBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RopkeH15, author = {Christian R{\"{o}}pke and Thorsten Holz}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {{SDN} Rootkits: Subverting Network Operating Systems of Software-Defined Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {339--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_16}, doi = {10.1007/978-3-319-26362-5\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RopkeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShuYR15, author = {Xiaokui Shu and Danfeng (Daphne) Yao and Barbara G. Ryder}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {A Formal Framework for Program Anomaly Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {270--292}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_13}, doi = {10.1007/978-3-319-26362-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShuYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SmutzS15, author = {Charles Smutz and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Preventing Exploits in Microsoft Office Documents Through Content Randomization}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {225--246}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_11}, doi = {10.1007/978-3-319-26362-5\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SmutzS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/UllrichW15, author = {Johanna Ullrich and Edgar R. Weippl}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {448--468}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_21}, doi = {10.1007/978-3-319-26362-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/UllrichW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WeisserDH15, author = {Dario Wei{\ss}er and Johannes Dahse and Thorsten Holz}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Security Analysis of {PHP} Bytecode Protection Mechanisms}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {493--514}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_23}, doi = {10.1007/978-3-319-26362-5\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WeisserDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuWS15, author = {Haitao Xu and Haining Wang and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Privacy Risk Assessment on Online Photos}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {427--447}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_20}, doi = {10.1007/978-3-319-26362-5\_20}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangDP15, author = {Qilang Yang and Dimitrios Damopoulos and Georgios Portokalidis}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {{WYSISNWIV:} What You Scan Is Not What {I} Visit}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {317--338}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_15}, doi = {10.1007/978-3-319-26362-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YangDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangZLSLHG15, author = {Wenbo Yang and Yuanyuan Zhang and Juanru Li and Junliang Shu and Bodong Li and Wenjun Hu and Dawu Gu}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {AppSpear: Bytecode Decrypting and {DEX} Reassembling for Packed Android Malware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {359--381}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_17}, doi = {10.1007/978-3-319-26362-5\_17}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YangZLSLHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YuanZD15, author = {Pinghai Yuan and Qingkai Zeng and Xuhua Ding}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Hardware-Assisted Fine-Grained Code-Reuse Attack Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {66--85}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_4}, doi = {10.1007/978-3-319-26362-5\_4}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YuanZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZengL15, author = {Junyuan Zeng and Zhiqiang Lin}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Towards Automatic Inference of Kernel Object Semantics from Binary Code}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {538--561}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_25}, doi = {10.1007/978-3-319-26362-5\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZengL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangSDCZFF15, author = {Yang Zhang and Xiaoshan Sun and Yi Deng and Liang Cheng and Shuke Zeng and Yu Fu and Dengguo Feng}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Improving Accuracy of Static Integer Overflow Detection in Binary}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {247--269}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_12}, doi = {10.1007/978-3-319-26362-5\_12}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangSDCZFF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2015, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5}, doi = {10.1007/978-3-319-26362-5}, isbn = {978-3-319-26361-8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AbbasiWBZE14, author = {Ali Abbasi and Jos Wetzels and Wouter Bokslag and Emmanuele Zambon and Sandro Etalle}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {On Emulation-Based Network Intrusion Detection Systems}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {384--404}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_19}, doi = {10.1007/978-3-319-11379-1\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AbbasiWBZE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AmannHS14, author = {Johanna Amann and Seth Hall and Robin Sommer}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {320--340}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_16}, doi = {10.1007/978-3-319-11379-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AmannHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ApececheaIES14, author = {Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Wait a Minute! {A} fast, Cross-VM Attack on {AES}}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {299--319}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_15}, doi = {10.1007/978-3-319-11379-1\_15}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ApececheaIES14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BoggsDS14, author = {Nathaniel Boggs and Senyao Du and Salvatore J. Stolfo}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Measuring Drive-by Download Defense in Depth}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {172--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_9}, doi = {10.1007/978-3-319-11379-1\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BoggsDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BoggsZDS14, author = {Nathaniel Boggs and Hang Zhao and Senyao Du and Salvatore J. Stolfo}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Synthetic Data Generation and Defense in Depth Measurement of Web Applications}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {234--254}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_12}, doi = {10.1007/978-3-319-11379-1\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BoggsZDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BowersHJT14, author = {Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {46--67}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_3}, doi = {10.1007/978-3-319-11379-1\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BowersHJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BudiantoJDSL14, author = {Enrico Budianto and Yaoqi Jia and Xinshu Dong and Prateek Saxena and Zhenkai Liang}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {150--171}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_8}, doi = {10.1007/978-3-319-11379-1\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BudiantoJDSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaminaRM14, author = {Jos{\'{e}} Benito Cami{\~{n}}a and Jorge Rodr{\'{\i}}guez{-}Ruiz and Ra{\'{u}}l Monroy}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Towards a Masquerade Detection System Based on User's Tasks}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {447--465}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_22}, doi = {10.1007/978-3-319-11379-1\_22}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CaminaRM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaoSBKVC14, author = {Yinzhi Cao and Yan Shoshitaishvili and Kevin Borgolte and Christopher Kr{\"{u}}gel and Giovanni Vigna and Yan Chen}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {276--298}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_14}, doi = {10.1007/978-3-319-11379-1\_14}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CorbettaIKV14, author = {Jacopo Corbetta and Luca Invernizzi and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {130--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_7}, doi = {10.1007/978-3-319-11379-1\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HendaN14, author = {Noomene Ben Henda and Karl Norrman}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Formal Analysis of Security Procedures in {LTE} - {A} Feasibility Study}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {341--361}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_17}, doi = {10.1007/978-3-319-11379-1\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HendaN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KhanAH14, author = {Hassan Khan and Aaron Atwater and Urs Hengartner}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {A Comparative Evaluation of Implicit Authentication Schemes}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {255--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_13}, doi = {10.1007/978-3-319-11379-1\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KhanAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KuhrerRH14, author = {Marc K{\"{u}}hrer and Christian Rossow and Thorsten Holz}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Paint It Black: Evaluating the Effectiveness of Malware Blacklists}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {1--21}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_1}, doi = {10.1007/978-3-319-11379-1\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KuhrerRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Kumar14, author = {Apurva Kumar}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {A Lightweight Formal Approach for Analyzing Security of Web Protocols}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {192--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_10}, doi = {10.1007/978-3-319-11379-1\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Kumar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LeeCKSK14, author = {Il{-}Gu Lee and Hyunwoo Choi and Yongdae Kim and Seungwon Shin and Myungchul Kim}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {362--383}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_18}, doi = {10.1007/978-3-319-11379-1\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LeeCKSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NayakMED14, author = {Kartik Nayak and Daniel Marino and Petros Efstathopoulos and Tudor Dumitras}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {426--446}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_21}, doi = {10.1007/978-3-319-11379-1\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NayakMED14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OkhraviRC14, author = {Hamed Okhravi and James Riordan and Kevin M. Carter}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {405--425}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_20}, doi = {10.1007/978-3-319-11379-1\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OkhraviRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PappasPK14, author = {Vasilis Pappas and Michalis Polychronakis and Angelos D. Keromytis}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Dynamic Reconstruction of Relocation Information for Stripped Binaries}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {68--87}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_4}, doi = {10.1007/978-3-319-11379-1\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PappasPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchusterTPMSCH14, author = {Felix Schuster and Thomas Tendyck and Jannik Pewny and Andreas Maa{\ss} and Martin Steegmanns and Moritz Contag and Thorsten Holz}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Evaluating the Effectiveness of Current Anti-ROP Defenses}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {88--108}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_5}, doi = {10.1007/978-3-319-11379-1\_5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchusterTPMSCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TangSS14, author = {Adrian Tang and Simha Sethumadhavan and Salvatore J. Stolfo}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Unsupervised Anomaly-Based Malware Detection Using Hardware Features}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {109--129}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_6}, doi = {10.1007/978-3-319-11379-1\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TangSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WeissbacherLR14, author = {Michael Weissbacher and Tobias Lauinger and William K. Robertson}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Why Is {CSP} Failing? Trends and Challenges in {CSP} Adoption}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {212--233}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_11}, doi = {10.1007/978-3-319-11379-1\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WeissbacherLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuZGL14, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {22--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_2}, doi = {10.1007/978-3-319-11379-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuZGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2014, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1}, doi = {10.1007/978-3-319-11379-1}, isbn = {978-3-319-11378-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AkiyamaYAHK13, author = {Mitsuaki Akiyama and Takeshi Yagi and Kazufumi Aoki and Takeo Hariu and Youki Kadobayashi}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Active Credential Leakage for Observing Web-Based Attack Cycle}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {223--243}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_12}, doi = {10.1007/978-3-642-41284-4\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/AkiyamaYAHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BuenoCSB13, author = {Denis Bueno and Kevin J. Compton and Karem A. Sakallah and Michael D. Bailey}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Detecting Traditional Packers, Decisively}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {184--203}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_10}, doi = {10.1007/978-3-642-41284-4\_10}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BuenoCSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/EggerSKV13, author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Practical Attacks against the {I2P} Network}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {432--451}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_22}, doi = {10.1007/978-3-642-41284-4\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/EggerSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FritzLP13, author = {Jakob Fritz and Corrado Leita and Michalis Polychronakis}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Server-Side Code Injection Attacks: {A} Historical Perspective}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {41--61}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_3}, doi = {10.1007/978-3-642-41284-4\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FritzLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GrazianoLB13, author = {Mariano Graziano and Andrea Lanzi and Davide Balzarotti}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Hypervisor Memory Forensics}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {21--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_2}, doi = {10.1007/978-3-642-41284-4\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GrazianoLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HoffmannNH13, author = {Johannes Hoffmann and Stephan Neumann and Thorsten Holz}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Mobile Malware Detection Based on Energy Fingerprints - {A} Dead End?}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {348--368}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_18}, doi = {10.1007/978-3-642-41284-4\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HoffmannNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Jiang0SZ13, author = {Nan Jiang and Yu Jin and Ann Skudlark and Zhi{-}Li Zhang}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Understanding {SMS} Spam in a Large Cellular Network: Characteristics, Strategies and Defenses}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {328--347}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_17}, doi = {10.1007/978-3-642-41284-4\_17}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Jiang0SZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JohnsL13, author = {Martin Johns and Sebastian Lekies}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Tamper-Resistant LikeJacking Protection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {265--285}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_14}, doi = {10.1007/978-3-642-41284-4\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JohnsL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KawakoyaISH13, author = {Yuhei Kawakoya and Makoto Iwamura and Eitaro Shioji and Takeo Hariu}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {{API} Chaser: Anti-analysis Resistant Malware Analyzer}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {123--143}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_7}, doi = {10.1007/978-3-642-41284-4\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KawakoyaISH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LauingerOAKRK13, author = {Tobias Lauinger and Kaan Onarlioglu and Chaabane Abdelberi and Engin Kirda and William K. Robertson and Mohamed Ali K{\^{a}}afar}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {369--389}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_19}, doi = {10.1007/978-3-642-41284-4\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LauingerOAKRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NadjiAPL13, author = {Yacin Nadji and Manos Antonakakis and Roberto Perdisci and Wenke Lee}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Connected Colors: Unveiling the Structure of Criminal Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {390--410}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_20}, doi = {10.1007/978-3-642-41284-4\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NadjiAPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OswaldRP13, author = {David F. Oswald and Bastian Richter and Christof Paar}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Side-Channel Attacks on the Yubikey 2 One-Time Password Generator}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {204--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_11}, doi = {10.1007/978-3-642-41284-4\_11}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OswaldRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PappasKZPK13, author = {Vasilis Pappas and Vasileios P. Kemerlis and Angeliki Zavou and Michalis Polychronakis and Angelos D. Keromytis}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {CloudFence: Data Flow Tracking as a Cloud Service}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {411--431}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_21}, doi = {10.1007/978-3-642-41284-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/PappasKZPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RafiqueC13, author = {M. Zubair Rafique and Juan Caballero}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {{FIRMA:} Malware Clustering and Network Signature Generation with Mixed Network Behaviors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {144--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_8}, doi = {10.1007/978-3-642-41284-4\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RafiqueC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Singh13, author = {Kapil Singh}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Practical Context-Aware Permission Control for Hybrid Mobile Applications}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {307--327}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_16}, doi = {10.1007/978-3-642-41284-4\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Singh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SkowyraCOZS13, author = {Richard Skowyra and Kelly Casteel and Hamed Okhravi and Nickolai Zeldovich and William W. Streilein}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Systematic Analysis of Defenses against Return-Oriented Programming}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {82--102}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_5}, doi = {10.1007/978-3-642-41284-4\_5}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SkowyraCOZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/StancillSOMDS13, author = {Blaine Stancill and Kevin Z. Snow and Nathan Otterness and Fabian Monrose and Lucas Davi and Ahmad{-}Reza Sadeghi}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of {ROP} Gadgets}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {62--81}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_4}, doi = {10.1007/978-3-642-41284-4\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/StancillSOMDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Stewin13, author = {Patrick Stewin}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {1--20}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_1}, doi = {10.1007/978-3-642-41284-4\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Stewin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ViswanathanTN13, author = {Arun Viswanathan and Kymie Tan and Clifford Neuman}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Deconstructing the Assessment of Anomaly-based Intrusion Detectors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {286--306}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_15}, doi = {10.1007/978-3-642-41284-4\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ViswanathanTN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WressneggerBR13, author = {Christian Wressnegger and Frank Boldewin and Konrad Rieck}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Deobfuscating Embedded Malware Using Probable-Plaintext Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {164--183}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_9}, doi = {10.1007/978-3-642-41284-4\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WressneggerBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Xiong013, author = {Xi Xiong and Peng Liu}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {{SILVER:} Fine-Grained and Transparent Protection Domain Primitives in Commodity {OS} Kernel}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {103--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_6}, doi = {10.1007/978-3-642-41284-4\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Xiong013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhaoL13, author = {Bin Zhao and Peng Liu}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {244--264}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_13}, doi = {10.1007/978-3-642-41284-4\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhaoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2013, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4}, doi = {10.1007/978-3-642-41284-4}, isbn = {978-3-642-41283-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AhnL12, author = {Dongkyun Ahn and Gyungho Lee}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {A Memory Access Validation Scheme against Payload Injection Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {107--126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_6}, doi = {10.1007/978-3-642-33338-5\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/AhnL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AmannSSH12, author = {B. Amann and Robin Sommer and Aashish Sharma and Seth Hall}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {314--333}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_16}, doi = {10.1007/978-3-642-33338-5\_16}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AmannSSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CarboneCML12, author = {Martim Carbone and Matthew Conover and Bruce Montague and Wenke Lee}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {22--41}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_2}, doi = {10.1007/978-3-642-33338-5\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CarboneCML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChuGHJYY12, author = {Jie Chu and Zihui Ge and Richard Huber and Ping Ji and Jennifer Yates and Yung{-}Chao Yu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{ALERT-ID:} Analyze Logs of the Network Element in Real Time for Intrusion Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {294--313}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_15}, doi = {10.1007/978-3-642-33338-5\_15}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChuGHJYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CuiSLL12, author = {Xiang Cui and Jinqiao Shi and Peng Liao and Chaoge Liu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {376--377}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_20}, doi = {10.1007/978-3-642-33338-5\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CuiSLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DurfinaKZK12, author = {Luk{\'{a}}s Durfina and Jakub Kroustek and Petr Zemek and Bretislav K{\'{a}}bele}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {390--392}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_27}, doi = {10.1007/978-3-642-33338-5\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DurfinaKZK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Garcia-VillalbaCOP12, author = {Luis Javier Garc{\'{\i}}a{-}Villalba and Jaime Daniel Mej{\'{\i}}a Castro and Ana Lucila Sandoval Orozco and Javier Mart{\'{\i}}nez Puentes}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {397--398}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_30}, doi = {10.1007/978-3-642-33338-5\_30}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Garcia-VillalbaCOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HadziosmanovicSBZE12, author = {Dina Hadziosmanovic and Lorenzo Simionato and Damiano Bolzoni and Emmanuele Zambon and Sandro Etalle}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {354--373}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_18}, doi = {10.1007/978-3-642-33338-5\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HadziosmanovicSBZE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JinYC12, author = {Shuyuan Jin and Zhi Yang and Xiang Cui}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Automatic Covert Channel Detection in Asbestos System (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {380--381}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_22}, doi = {10.1007/978-3-642-33338-5\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JinYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LauingerKM12, author = {Tobias Lauinger and Engin Kirda and Pietro Michiardi}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {169--189}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_9}, doi = {10.1007/978-3-642-33338-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LauingerKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LekiesNTPJ12, author = {Sebastian Lekies and Nick Nikiforakis and Walter Tighzert and Frank Piessens and Martin Johns}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{DEMACRO:} Defense against Malicious Cross-Domain Requests}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {254--273}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_13}, doi = {10.1007/978-3-642-33338-5\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LekiesNTPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MahmoodD12, author = {Shah Mahmood and Yvo Desmedt}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {374--375}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_19}, doi = {10.1007/978-3-642-33338-5\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MahmoodD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MankinK12, author = {Jennifer Mankin and David R. Kaeli}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Dione: {A} Flexible Disk Monitoring and Analysis Framework}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {127--146}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_7}, doi = {10.1007/978-3-642-33338-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MankinK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MarchalFSE12, author = {Samuel Marchal and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Radu State and Thomas Engel}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Proactive Discovery of Phishing Related Domain Names}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {190--209}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_10}, doi = {10.1007/978-3-642-33338-5\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MarchalFSE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MashimaC12, author = {Daisuke Mashima and Alvaro A. C{\'{a}}rdenas}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Evaluating Electricity Theft Detectors in Smart Grid Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {210--229}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_11}, doi = {10.1007/978-3-642-33338-5\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MashimaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OverveldtKV12, author = {Timon Van Overveldt and Christopher Kruegel and Giovanni Vigna}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {FlashDetect: ActionScript 3 Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {274--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_14}, doi = {10.1007/978-3-642-33338-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OverveldtKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/QiaoLSG12, author = {Dengke Qiao and Tingwen Liu and Yong Sun and Li Guo}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{EFA} for Efficient Regular Expression Matching in {NIDS} (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {382--383}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_23}, doi = {10.1007/978-3-642-33338-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/QiaoLSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SanchezG12, author = {Jenny Andrea Pinto S{\'{a}}nchez and Luis Javier Garc{\'{\i}}a{-}Villalba}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {386--387}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_25}, doi = {10.1007/978-3-642-33338-5\_25}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SanchezG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShoshaJLG12, author = {Ahmed F. Shosha and Joshua James and Chen{-}Ching Liu and Pavel Gladyshev}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {388--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_26}, doi = {10.1007/978-3-642-33338-5\_26}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShoshaJLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SrivastavaRGE12, author = {Abhinav Srivastava and Himanshu Raj and Jonathon T. Giffin and Paul England}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Trusted {VM} Snapshots in Untrusted Cloud Infrastructures}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {1--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_1}, doi = {10.1007/978-3-642-33338-5\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SrivastavaRGE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThonnardBOKL12, author = {Olivier Thonnard and Leyla Bilge and Gavin O'Gorman and Se{\'{a}}n Kiernan and Martin Lee}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {64--85}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_4}, doi = {10.1007/978-3-642-33338-5\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ThonnardBOKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ValgentiCSSKKD12, author = {Victor C. Valgenti and Jatin Chhugani and Yan Sun and Nadathur Satish and Min Sik Kim and Changkyu Kim and Pradeep Dubey}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {334--353}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_17}, doi = {10.1007/978-3-642-33338-5\_17}, timestamp = {Wed, 30 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ValgentiCSSKKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VeendCB12, author = {Victor van der Veen and Nitish dutt{-}Sharma and Lorenzo Cavallaro and Herbert Bos}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Memory Errors: The Past, the Present, and the Future}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {86--106}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_5}, doi = {10.1007/978-3-642-33338-5\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VeendCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VegaVCG12, author = {Hugo Villan{\'{u}}a Vega and Jorge Maestre Vidal and Jaime Daniel Mej{\'{\i}}a Castro and Luis Javier Garc{\'{\i}}a{-}Villalba}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Improvement of an Anagram Based {NIDS} by Reducing the Storage Space of Bloom Filters (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {393--394}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_28}, doi = {10.1007/978-3-642-33338-5\_28}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VegaVCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VellaTR12, author = {Mark Vella and Sotirios Terzis and Marc Roper}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Distress Detection (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {384--385}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_24}, doi = {10.1007/978-3-642-33338-5\_24}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VellaTR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VidalVCG12, author = {Jorge Maestre Vidal and Hugo Villan{\'{u}}a Vega and Jaime Daniel Mej{\'{\i}}a Castro and Luis Javier Garc{\'{\i}}a{-}Villalba}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Concurrency Optimization for {NIDS} (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {395--396}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_29}, doi = {10.1007/978-3-642-33338-5\_29}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VidalVCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WuYF12, author = {Jinyu Wu and Lihua Yin and Binxing Fang}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {378--379}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_21}, doi = {10.1007/978-3-642-33338-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WuYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuHCZH12, author = {Zhi Xu and Hung{-}Yuan Hsu and Xin Chen and Sencun Zhu and Ali R. Hurson}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{AK-PPM:} An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {147--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_8}, doi = {10.1007/978-3-642-33338-5\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuHCZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangL12, author = {Shengzhi Zhang and Peng Liu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Assessing the Trustworthiness of Drivers}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {42--63}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_3}, doi = {10.1007/978-3-642-33338-5\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangYXG12, author = {Jialong Zhang and Chao Yang and Zhaoyan Xu and Guofei Gu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {230--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_12}, doi = {10.1007/978-3-642-33338-5\_12}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2012, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5}, doi = {10.1007/978-3-642-33338-5}, isbn = {978-3-642-33337-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BeckerSNS11, author = {Sheila Becker and Jeff Seibert and Cristina Nita{-}Rotaru and Radu State}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {201--221}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_11}, doi = {10.1007/978-3-642-23644-0\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BeckerSNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BoggsHSS11, author = {Nathaniel Boggs and Sharath Hiremagalore and Angelos Stavrou and Salvatore J. Stolfo}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {142--160}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_8}, doi = {10.1007/978-3-642-23644-0\_8}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BoggsHSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BosmanSB11, author = {Erik Bosman and Asia Slowinska and Herbert Bos}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Minemu: The World's Fastest Taint Tracker}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_1}, doi = {10.1007/978-3-642-23644-0\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BosmanSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BuescherLS11, author = {Armin Buescher and Felix Leder and Thomas Siebert}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Banksafe Information Stealer Detection Inside the Web Browser}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {262--280}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_14}, doi = {10.1007/978-3-642-23644-0\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BuescherLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChakravartyPPK11, author = {Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Detecting Traffic Snooping in Tor Using Decoys}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {222--241}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_12}, doi = {10.1007/978-3-642-23644-0\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChakravartyPPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CuiS11, author = {Ang Cui and Salvatore J. Stolfo}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Defending Embedded Systems with Software Symbiotes}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {358--377}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_19}, doi = {10.1007/978-3-642-23644-0\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CuiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DuflotPM11, author = {Lo{\"{\i}}c Duflot and Yves{-}Alexis Perez and Benjamin Morin}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {What If You Can't Trust Your Network Card?}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {378--397}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_20}, doi = {10.1007/978-3-642-23644-0\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DuflotPM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FratantonioKV11, author = {Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Shellzer: {A} Tool for the Dynamic Analysis of Malicious Shellcode}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {61--80}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_4}, doi = {10.1007/978-3-642-23644-0\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FratantonioKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GilbertKKV11, author = {Bob Gilbert and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Dymo: Tracking Dynamic Code Identity}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {21--40}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_2}, doi = {10.1007/978-3-642-23644-0\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GilbertKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GrobertWH11, author = {Felix Gr{\"{o}}bert and Carsten Willems and Thorsten Holz}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Automated Identification of Cryptographic Primitives in Binary Programs}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {41--60}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_3}, doi = {10.1007/978-3-642-23644-0\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GrobertWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HeiderichFH11, author = {Mario Heiderich and Tilman Frosch and Thorsten Holz}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {IceShield: Detection and Mitigation of Malicious Websites with a Frozen {DOM}}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {281--300}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_15}, doi = {10.1007/978-3-642-23644-0\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HeiderichFH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LindorferKC11, author = {Martina Lindorfer and Clemens Kolbitsch and Paolo Milani Comparetti}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Detecting Environment-Sensitive Malware}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {338--357}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_18}, doi = {10.1007/978-3-642-23644-0\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LindorferKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuZWG11, author = {Kangjie Lu and Dabi Zou and Weiping Wen and Debin Gao}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Packed, Printable, and Polymorphic Return-Oriented Programming}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {101--120}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_6}, doi = {10.1007/978-3-642-23644-0\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LuZWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MehdiKK11, author = {Syed Akbar Mehdi and Junaid Khalid and Syed Ali Khayam}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Revisiting Traffic Anomaly Detection Using Software Defined Networking}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {161--180}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_9}, doi = {10.1007/978-3-642-23644-0\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MehdiKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OrtolaniGC11, author = {Stefano Ortolani and Cristiano Giuffrida and Bruno Crispo}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {{KLIMAX:} Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {81--100}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_5}, doi = {10.1007/978-3-642-23644-0\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OrtolaniGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SalemS11, author = {Malek Ben Salem and Salvatore J. Stolfo}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Modeling User Search Behavior for Masquerade Detection}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {181--200}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_10}, doi = {10.1007/978-3-642-23644-0\_10}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SalemS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShinLG11, author = {Seungwon Shin and Raymond Lin and Guofei Gu}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Cross-Analysis of Botnet Victims: New Insights and Implications}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {242--261}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_13}, doi = {10.1007/978-3-642-23644-0\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShinLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SongLK11, author = {Jonghyuk Song and Sangho Lee and Jong Kim}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Spam Filtering in Twitter Using Sender-Receiver Relationship}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {301--317}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_16}, doi = {10.1007/978-3-642-23644-0\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SongLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TranEBJFN11, author = {Minh Tran and Mark Etheridge and Tyler K. Bletsch and Xuxian Jiang and Vincent W. Freeh and Peng Ning}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {On the Expressiveness of Return-into-libc Attacks}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {121--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_7}, doi = {10.1007/978-3-642-23644-0\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TranEBJFN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangHG11, author = {Chao Yang and Robert Chandler Harkreader and Guofei Gu}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {318--337}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_17}, doi = {10.1007/978-3-642-23644-0\_17}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YangHG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2011, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0}, doi = {10.1007/978-3-642-23644-0}, isbn = {978-3-642-23643-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AntonakakisDLPLB10, author = {Manos Antonakakis and David Dagon and Xiapu Luo and Roberto Perdisci and Wenke Lee and Justin Bellmor}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {A Centralized Monitoring Infrastructure for Improving {DNS} Security}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {18--37}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_2}, doi = {10.1007/978-3-642-15512-3\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/AntonakakisDLPLB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BalduzziPHKBK10, author = {Marco Balduzzi and Christian Platzer and Thorsten Holz and Engin Kirda and Davide Balzarotti and Christopher Kruegel}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Abusing Social Networks for Automated User Profiling}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {422--441}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_22}, doi = {10.1007/978-3-642-15512-3\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BalduzziPHKBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BowenPKSKS10, author = {Brian M. Bowen and Pratap V. Prabhu and Vasileios P. Kemerlis and Stelios Sidiroglou and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {118--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_7}, doi = {10.1007/978-3-642-15512-3\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BowenPKSKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CallegariGGPP10, author = {Christian Callegari and Loris Gazzarrini and Stefano Giordano and Michele Pagano and Teresa Pepe}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Detecting Network Anomalies in Backbone Networks}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {490--491}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_28}, doi = {10.1007/978-3-642-15512-3\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CallegariGGPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CovaLTKD10, author = {Marco Cova and Corrado Leita and Olivier Thonnard and Angelos D. Keromytis and Marc Dacier}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {An Analysis of Rogue {AV} Campaigns}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {442--463}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_23}, doi = {10.1007/978-3-642-15512-3\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CovaLTKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CucurullAN10, author = {Jordi Cucurull and Mikael Asplund and Simin Nadjm{-}Tehrani}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Anomaly Detection and Mitigation for Disaster Area Networks}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {339--359}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_18}, doi = {10.1007/978-3-642-15512-3\_18}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CucurullAN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DrasarVKC10, author = {Martin Drasar and Jan Vykopal and Radek Krejc{\'{\i}} and Pavel Celeda}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Aspect-Based Attack Detection in Large-Scale Networks}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {488--489}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_27}, doi = {10.1007/978-3-642-15512-3\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DrasarVKC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GiuraM10, author = {Paul Giura and Nasir D. Memon}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {277--296}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_15}, doi = {10.1007/978-3-642-15512-3\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GiuraM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HadziosmanovicBH10, author = {Dina Hadziosmanovic and Damiano Bolzoni and Pieter H. Hartel}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {{MEDUSA:} Mining Events to Detect Undesirable uSer Actions in {SCADA}}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {500--501}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_33}, doi = {10.1007/978-3-642-15512-3\_33}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HadziosmanovicBH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HaqAKK10, author = {Irfan Ul Haq and Sardar Ali and Hassan Khan and Syed Ali Khayam}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {What Is the Impact of {P2P} Traffic on Anomaly Detection?}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {1--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_1}, doi = {10.1007/978-3-642-15512-3\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HaqAKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HsuHC10, author = {Ching{-}Hsiang Hsu and Chun{-}Ying Huang and Kuan{-}Ta Chen}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Fast-Flux Bot Detection in Real Time}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {464--483}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_24}, doi = {10.1007/978-3-642-15512-3\_24}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HsuHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiangCD10, author = {Jianchun Jiang and Weifeng Chen and Liping Ding}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {On Estimating Cyber Adversaries' Capabilities: {A} Bayesian Model Approach}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {502--504}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_34}, doi = {10.1007/978-3-642-15512-3\_34}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/JiangCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KamraB10, author = {Ashish Kamra and Elisa Bertino}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Privilege States Based Access Control for Fine-Grained Intrusion Response}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {402--421}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_21}, doi = {10.1007/978-3-642-15512-3\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KamraB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KillourhyM10, author = {Kevin S. Killourhy and Roy A. Maxion}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Why Did My Detector Do \emph{That}?! - Predicting Keystroke-Dynamics Error Rates}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {256--276}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_14}, doi = {10.1007/978-3-642-15512-3\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KillourhyM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KochR10, author = {Robert Koch and Gabi Dreo Rodosek}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Security System for Encrypted Environments {(S2E2)}}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {505--507}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_35}, doi = {10.1007/978-3-642-15512-3\_35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KochR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KongZL10, author = {Ying Kong and Yuqing Zhang and Qixu Liu}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Eliminating Human Specification in Static Analysis}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {494--495}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_30}, doi = {10.1007/978-3-642-15512-3\_30}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KongZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiLGR10, author = {Peng Li and Limin Liu and Debin Gao and Michael K. Reiter}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {On Challenges in Evaluating Malware Clustering}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {238--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_13}, doi = {10.1007/978-3-642-15512-3\_13}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiLGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MartignoniFPC10, author = {Lorenzo Martignoni and Aristide Fattori and Roberto Paleari and Lorenzo Cavallaro}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Live and Trustworthy Forensic Analysis of Commodity Production Systems}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {297--316}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_16}, doi = {10.1007/978-3-642-15512-3\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MartignoniFPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MathewPNU10, author = {Sunu Mathew and Michalis Petropoulos and Hung Q. Ngo and Shambhu J. Upadhyaya}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {A Data-Centric Approach to Insider Attack Detection in Database Systems}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {382--401}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_20}, doi = {10.1007/978-3-642-15512-3\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MathewPNU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MokhovPD10, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the {IDS} Evidence}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {508--509}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_36}, doi = {10.1007/978-3-642-15512-3\_36}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MokhovPD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NiksefatASS10, author = {Salman Niksefat and Mohammad Mehdi Ahaniha and Babak Sadeghiyan and Mehdi Shajari}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Toward Specification-Based Intrusion Detection for Web Applications}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {510--511}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_37}, doi = {10.1007/978-3-642-15512-3\_37}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NiksefatASS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OlinerKA10, author = {Adam J. Oliner and Ashutosh V. Kulkarni and Alex Aiken}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Community Epidemic Detection Using Time-Correlated Anomalies}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {360--381}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_19}, doi = {10.1007/978-3-642-15512-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OlinerKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OrtolaniGC10, author = {Stefano Ortolani and Cristiano Giuffrida and Bruno Crispo}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Bait Your Hook: {A} Novel Detection Technique for Keyloggers}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {198--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_11}, doi = {10.1007/978-3-642-15512-3\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OrtolaniGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RheeRXJ10, author = {Junghwan Rhee and Ryan D. Riley and Dongyan Xu and Xuxian Jiang}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {178--197}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_10}, doi = {10.1007/978-3-642-15512-3\_10}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RheeRXJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RoundyM10, author = {Kevin A. Roundy and Barton P. Miller}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Hybrid Analysis and Control of Malware}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {317--338}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_17}, doi = {10.1007/978-3-642-15512-3\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RoundyM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SqalliAA10, author = {Mohammed H. Sqalli and Raed Al{-}Shaikh and Ezzat Ahmed}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {A Distributed Honeynet at {KFUPM:} {A} Case Study}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {486--487}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_26}, doi = {10.1007/978-3-642-15512-3\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SqalliAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SrivastavaG10, author = {Abhinav Srivastava and Jonathon T. Giffin}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Automatic Discovery of Parasitic Malware}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {97--117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_6}, doi = {10.1007/978-3-642-15512-3\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SrivastavaG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/StaffordL10, author = {Shad Stafford and Jun Li}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Behavior-Based Worm Detectors Compared}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {38--57}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_3}, doi = {10.1007/978-3-642-15512-3\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/StaffordL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TakurouM10, author = {Hosoi Takurou and Kanta Matsuura}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {496--497}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_31}, doi = {10.1007/978-3-642-15512-3\_31}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TakurouM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VasiliadisI10, author = {Giorgos Vasiliadis and Sotiris Ioannidis}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {GrAVity: {A} Massively Parallel Antivirus Engine}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {79--96}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_5}, doi = {10.1007/978-3-642-15512-3\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/VasiliadisI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangSG10, author = {Jiang Wang and Angelos Stavrou and Anup K. Ghosh}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {HyperCheck: {A} Hardware-Assisted Integrity Monitor}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {158--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_9}, doi = {10.1007/978-3-642-15512-3\_9}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangZG10, author = {Yipeng Wang and Zhibin Zhang and Li Guo}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Inferring Protocol State Machine from Real-World Trace}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {498--499}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_32}, doi = {10.1007/978-3-642-15512-3\_32}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WhelanK10, author = {Ryan Whelan and David R. Kaeli}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {512--513}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_38}, doi = {10.1007/978-3-642-15512-3\_38}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WhelanK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WrightCBRRC10, author = {Charles V. Wright and Christopher Connelly and Timothy M. Braje and Jesse C. Rabek and Lee M. Rossey and Robert K. Cunningham}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {218--237}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_12}, doi = {10.1007/978-3-642-15512-3\_12}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WrightCBRRC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XingZC10, author = {Luyi Xing and Yuqing Zhang and Shenlong Chen}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {484--485}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_25}, doi = {10.1007/978-3-642-15512-3\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XingZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuBWJ10, author = {Yunjing Xu and Michael D. Bailey and Eric Vander Weele and Farnam Jahanian}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {CANVuS: Context-Aware Network Vulnerability Scanning}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {138--157}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_8}, doi = {10.1007/978-3-642-15512-3\_8}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/XuBWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuMY10, author = {Kui Xu and Qiang Ma and Danfeng (Daphne) Yao}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Detecting the Onset of Infection for Secure Hosts}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {492--493}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_29}, doi = {10.1007/978-3-642-15512-3\_29}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/XuMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangKGS10, author = {Liu Yang and Rezwana Karim and Vinod Ganapathy and Randy Smith}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {58--78}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_4}, doi = {10.1007/978-3-642-15512-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YangKGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangQH10, author = {FuYong Zhang and DeYu Qi and JingLin Hu}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Using {IRP} for Malware Detection}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {514--515}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_39}, doi = {10.1007/978-3-642-15512-3\_39}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangQH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2010, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3}, doi = {10.1007/978-3-642-15512-3}, isbn = {978-3-642-15511-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BolzoniEH09, author = {Damiano Bolzoni and Sandro Etalle and Pieter H. Hartel}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {1--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_1}, doi = {10.1007/978-3-642-04342-0\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BolzoniEH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaballeroLPS09, author = {Juan Caballero and Zhenkai Liang and Pongsin Poosankam and Dawn Song}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {161--181}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_9}, doi = {10.1007/978-3-642-04342-0\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CaballeroLPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Cretu-CiocarlieSLS09, author = {Gabriela F. Cretu{-}Ciocarlie and Angelos Stavrou and Michael E. Locasto and Salvatore J. Stolfo}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Adaptive Anomaly Detection via Self-calibration and Dynamic Updating}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {41--60}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_3}, doi = {10.1007/978-3-642-04342-0\_3}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Cretu-CiocarlieSLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CuiSPS09, author = {Ang Cui and Yingbo Song and Pratap V. Prabhu and Salvatore J. Stolfo}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Brave New World: Pervasive Insecurity of Embedded Network Devices}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {378--380}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_32}, doi = {10.1007/978-3-642-04342-0\_32}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CuiSPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DemayTT09, author = {Jonathan{-}Christofer Demay and Eric Totel and Fr{\'{e}}d{\'{e}}ric Tronel}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Automatic Software Instrumentation for the Detection of Non-control-data Attacks}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {348--349}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_19}, doi = {10.1007/978-3-642-04342-0\_19}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DemayTT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Erete09, author = {Ikpeme Erete}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Browser-Based Intrusion Prevention System}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {371--373}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_29}, doi = {10.1007/978-3-642-04342-0\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Erete09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/EreteYP09, author = {Ikpeme Erete and Vinod Yegneswaran and Phillip A. Porras}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {ALICE@home: Distributed Framework for Detecting Malicious Sites}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {362--364}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_25}, doi = {10.1007/978-3-642-04342-0\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/EreteYP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FrancoisASF09, author = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Humberto J. Abdelnur and Radu State and Olivier Festor}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Automated Behavioral Fingerprinting}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {182--201}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_10}, doi = {10.1007/978-3-642-04342-0\_10}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FrancoisASF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GeorgeTM09, author = {Laurent George and Val{\'{e}}rie Viet Triem Tong and Ludovic M{\'{e}}}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Blare Tools: {A} Policy-Based Intrusion Detection System Automatically Set by the Security Policy}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {355--356}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_22}, doi = {10.1007/978-3-642-04342-0\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GeorgeTM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GiroireCTSP09, author = {Fr{\'{e}}d{\'{e}}ric Giroire and Jaideep Chandrashekar and Nina Taft and Eve M. Schooler and Dina Papagiannaki}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Exploiting Temporal Persistence to Detect Covert Botnet Channels}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {326--345}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_17}, doi = {10.1007/978-3-642-04342-0\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GiroireCTSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GriffinSHC09, author = {Kent Griffin and Scott Schneider and Xin Hu and Tzi{-}cker Chiueh}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Automatic Generation of String Signatures for Malware Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {101--120}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_6}, doi = {10.1007/978-3-642-04342-0\_6}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GriffinSHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HulbojJ09, author = {Milosz Marian Hulboj and Ryszard Erazm Jurga}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {{CERN} Investigation of Network Behaviour and Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {353--354}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_21}, doi = {10.1007/978-3-642-04342-0\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HulbojJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/InoueSEYN09, author = {Daisuke Inoue and Mio Suzuki and Masashi Eto and Katsunari Yoshioka and Koji Nakao}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {{DAEDALUS:} Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {381--382}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_33}, doi = {10.1007/978-3-642-04342-0\_33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/InoueSEYN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JacobDF09, author = {Gr{\'{e}}goire Jacob and Herv{\'{e}} Debar and Eric Filiol}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {81--100}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_5}, doi = {10.1007/978-3-642-04342-0\_5}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/JacobDF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JavedASK09, author = {Mobin Javed and Ayesha Binte Ashfaq and M. Zubair Shafiq and Syed Ali Khayam}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {On the Inefficient Use of Entropy for Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {369--370}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_28}, doi = {10.1007/978-3-642-04342-0\_28}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/JavedASK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiGFLL09, author = {Yang Li and Li Guo and Binxing Fang and Xiangtao Liu and Lin Qi}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {346--347}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_18}, doi = {10.1007/978-3-642-04342-0\_18}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LiGFLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiGR09, author = {Peng Li and Debin Gao and Michael K. Reiter}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Automatically Adapting a Trained Anomaly Detector to Software Patches}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {142--160}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_8}, doi = {10.1007/978-3-642-04342-0\_8}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiuYZC09, author = {Lei Liu and Guanhua Yan and Xinwen Zhang and Songqing Chen}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {VirusMeter: Preventing Your Cellphone from Spies}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {244--264}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_13}, doi = {10.1007/978-3-642-04342-0\_13}, timestamp = {Fri, 01 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiuYZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuYPL09, author = {Long Lu and Vinod Yegneswaran and Phillip A. Porras and Wenke Lee}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {{BLADE:} Slashing the Invisible Channel of Drive-by Download Malware}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {350--352}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_20}, doi = {10.1007/978-3-642-04342-0\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LuYPL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuchaupSEJ09, author = {Daniel Luchaup and Randy Smith and Cristian Estan and Somesh Jha}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Multi-byte Regular Expression Matching with Speculation}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {284--303}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_15}, doi = {10.1007/978-3-642-04342-0\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LuchaupSEJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaggiRKV09, author = {Federico Maggi and William K. Robertson and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Protecting a Moving Target: Addressing Web Application Concept Drift}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {21--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_2}, doi = {10.1007/978-3-642-04342-0\_2}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Massicotte09, author = {Fr{\'{e}}d{\'{e}}ric Massicotte}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Packet Space Analysis of Intrusion Detection Signatures}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {365--366}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_26}, doi = {10.1007/978-3-642-04342-0\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Massicotte09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Montigny-LeboeufCM09, author = {Annie De Montigny{-}Leboeuf and Mathieu Couture and Fr{\'{e}}d{\'{e}}ric Massicotte}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Traffic Behaviour Characterization Using NetMate}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {367--368}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_27}, doi = {10.1007/978-3-642-04342-0\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Montigny-LeboeufCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NoreenMSF09, author = {Sadia Noreen and Shafaq Murtaza and M. Zubair Shafiq and Muddassar Farooq}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Using Formal Grammar and Genetic Operators to Evolve Malware}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {374--375}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_30}, doi = {10.1007/978-3-642-04342-0\_30}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/NoreenMSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RehakSFPGSBE09, author = {Martin Reh{\'{a}}k and Eugen Staab and Volker Fusenig and Michal Pechoucek and Martin Grill and Jan Stiborek and Karel Bartos and Thomas Engel}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {61--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_4}, doi = {10.1007/978-3-642-04342-0\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RehakSFPGSBE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RozenbergGEF09, author = {Boris Rozenberg and Ehud Gudes and Yuval Elovici and Yuval Fledel}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Method for Detecting Unknown Malicious Executables}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {376--377}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_31}, doi = {10.1007/978-3-642-04342-0\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RozenbergGEF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShabtaiKE09, author = {Asaf Shabtai and Uri Kanonov and Yuval Elovici}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {357--358}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_23}, doi = {10.1007/978-3-642-04342-0\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShabtaiKE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShafiqTMF09, author = {M. Zubair Shafiq and S. Momina Tabish and Fauzan Mirza and Muddassar Farooq}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {121--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_7}, doi = {10.1007/978-3-642-04342-0\_7}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ShafiqTMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VasiliadisPAMI09, author = {Giorgos Vasiliadis and Michalis Polychronakis and Spyros Antonatos and Evangelos P. Markatos and Sotiris Ioannidis}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Regular Expression Matching on Graphics Hardware for Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {265--283}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_14}, doi = {10.1007/978-3-642-04342-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/VasiliadisPAMI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangGK09, author = {Wei Wang and Thomas Guyet and Svein J. Knapskog}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Autonomic Intrusion Detection System}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {359--361}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_24}, doi = {10.1007/978-3-642-04342-0\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuanCB09, author = {Chaoting Xuan and John A. Copeland and Raheem A. Beyah}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Toward Revealing Kernel Malware Behavior in Virtual Execution Environments}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {304--325}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_16}, doi = {10.1007/978-3-642-04342-0\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuanCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YanEG09, author = {Guanhua Yan and Stephan J. Eidenbenz and Emanuele Galli}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {SMS-Watchdog: Profiling Social Behaviors of {SMS} Users for Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {202--223}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_11}, doi = {10.1007/978-3-642-04342-0\_11}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YanEG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZahidSKF09, author = {Saira Zahid and Muhammad Shahzad and Syed Ali Khayam and Muddassar Farooq}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Keystroke-Based User Identification on Smart Phones}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {224--243}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_12}, doi = {10.1007/978-3-642-04342-0\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZahidSKF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2009, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0}, doi = {10.1007/978-3-642-04342-0}, isbn = {978-3-642-04341-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AbdelnurSF08, author = {Humberto J. Abdelnur and Radu State and Olivier Festor}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Advanced Network Fingerprinting}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {372--389}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_20}, doi = {10.1007/978-3-540-87403-4\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/AbdelnurSF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlmgrenLJ08, author = {Magnus Almgren and Ulf Lindqvist and Erland Jonsson}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A Multi-Sensor Model to Improve Automated Attack Detection}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {291--310}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_16}, doi = {10.1007/978-3-540-87403-4\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AlmgrenLJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AshfaqRMASK08, author = {Ayesha Binte Ashfaq and Maria Joseph Robert and Asma Mumtaz and Muhammad Qasim Ali and Ali Sajjad and Syed Ali Khayam}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A Comparative Evaluation of Anomaly Detectors under Portscan Attacks}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {351--371}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_19}, doi = {10.1007/978-3-540-87403-4\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AshfaqRMASK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BratusBKS08, author = {Sergey Bratus and Joshua Brody and David Kotz and Anna Shubina}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract)}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {412--414}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_32}, doi = {10.1007/978-3-540-87403-4\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BratusBKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BrownR08, author = {Andrew Brown and Mark Ryan}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Monitoring the Execution of Third-Party Software on Mobile Devices}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {410--411}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_31}, doi = {10.1007/978-3-540-87403-4\_31}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BrownR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaputoSSCK08, author = {Deanna D. Caputo and Greg Stephens and Brad Stephenson and Megan Cormier and Minna Kim}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract)}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {402--403}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_27}, doi = {10.1007/978-3-540-87403-4\_27}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CaputoSSCK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CavallaroS08, author = {Lorenzo Cavallaro and R. Sekar}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Anomalous Taint Detection}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {417--418}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_34}, doi = {10.1007/978-3-540-87403-4\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CavallaroS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CheetancheriALWR08, author = {Senthilkumar G. Cheetancheri and John Mark Agosta and Karl N. Levitt and Shyhtsun Felix Wu and Jeff Rowe}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - {A} Control Theoretic Approach}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {231--250}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_13}, doi = {10.1007/978-3-540-87403-4\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CheetancheriALWR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungM08, author = {Simon P. Chung and Aloysius K. Mok}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Swarm Attacks against Network-Level Emulation/Analysis}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {175--190}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_10}, doi = {10.1007/978-3-540-87403-4\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChungM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CollinsR08, author = {M. Patrick Collins and Michael K. Reiter}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {On the Limits of Payload-Oblivious Network Attack Detection}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {251--270}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_14}, doi = {10.1007/978-3-540-87403-4\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CollinsR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Dagorn08, author = {Nathalie Dagorn}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {WebIDS: {A} Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract)}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {392--393}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_22}, doi = {10.1007/978-3-540-87403-4\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Dagorn08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DregerFPS08, author = {Holger Dreger and Anja Feldmann and Vern Paxson and Robin Sommer}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Predicting the Resource Consumption of Network Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {135--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_8}, doi = {10.1007/978-3-540-87403-4\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DregerFPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GianvecchioWWJ08, author = {Steven Gianvecchio and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Model-Based Covert Timing Channels: Automated Modeling and Evasion}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {211--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_12}, doi = {10.1007/978-3-540-87403-4\_12}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GianvecchioWWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GuoFC08, author = {Fanglu Guo and Peter Ferrie and Tzi{-}cker Chiueh}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A Study of the Packer Problem and Its Solutions}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {98--115}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_6}, doi = {10.1007/978-3-540-87403-4\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GuoFC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JainLS08, author = {Divya Jain and K. Vasanta Lakshmi and Priti Shankar}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Deep Packet Inspection Using Message Passing Networks}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {419--420}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_35}, doi = {10.1007/978-3-540-87403-4\_35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JainLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KamraB08, author = {Ashish Kamra and Elisa Bertino}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Database Intrusion Detection and Response}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {400--401}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_26}, doi = {10.1007/978-3-540-87403-4\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KamraB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KillourhyM08, author = {Kevin S. Killourhy and Roy A. Maxion}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {The Effect of Clock Resolution on Keystroke Dynamics}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {331--350}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_18}, doi = {10.1007/978-3-540-87403-4\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KillourhyM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LeeC08, author = {Junsup Lee and Sung Deok Cha}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract)}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {404--405}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_28}, doi = {10.1007/978-3-540-87403-4\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LeeC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiomaMGBBPH08, author = {Christina Lioma and Marie{-}Francine Moens and Juan{-}Carlos Gomez and Jan De Beer and Andr{\'{e}} Bergholz and Gerhard Paass and Patrick Horkan}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Anticipating Hidden Text Salting in Emails}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {396--397}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_24}, doi = {10.1007/978-3-540-87403-4\_24}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LiomaMGBBPH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuG08, author = {Wei Lu and Ali A. Ghorbani}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract)}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {415--416}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_33}, doi = {10.1007/978-3-540-87403-4\_33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LuG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MartignoniSFJM08, author = {Lorenzo Martignoni and Elizabeth Stinson and Matt Fredrikson and Somesh Jha and John C. Mitchell}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A Layered Architecture for Detecting Malicious Behaviors}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {78--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_5}, doi = {10.1007/978-3-540-87403-4\_5}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/McAllisterKK08, author = {Sean McAllister and Engin Kirda and Christopher Kruegel}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Leveraging User Interactions for In-Depth Testing of Web Applications}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {191--210}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_11}, doi = {10.1007/978-3-540-87403-4\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/McAllisterKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Modelo-HowardBL08, author = {Gaspar Modelo{-}Howard and Saurabh Bagchi and Guy Lebanon}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {271--290}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_15}, doi = {10.1007/978-3-540-87403-4\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Modelo-HowardBL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NassarSF08, author = {Mohamed Nassar and Radu State and Olivier Festor}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Monitoring {SIP} Traffic Using Support Vector Machines}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {311--330}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_17}, doi = {10.1007/978-3-540-87403-4\_17}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NassarSF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RamsbrockWJ08, author = {Daniel Ramsbrock and Xinyuan Wang and Xuxian Jiang}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A First Step towards Live Botmaster Traceback}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {59--77}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_4}, doi = {10.1007/978-3-540-87403-4\_4}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RamsbrockWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RehakPBGCK08, author = {Martin Reh{\'{a}}k and Michal Pechoucek and Karel Bartos and Martin Grill and Pavel Celeda and Vojtech Krmicek}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Improving Anomaly Detection Error Rate by Collective Trust Modeling}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {398--399}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_25}, doi = {10.1007/978-3-540-87403-4\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RehakPBGCK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RileyJX08, author = {Ryan D. Riley and Xuxian Jiang and Dongyan Xu}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {1--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_1}, doi = {10.1007/978-3-540-87403-4\_1}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RileyJX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RubelPABW08, author = {Paul Rubel and Partha P. Pal and Michael Atighetchi and D. Paul Benjamin and Franklin Webber}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {408--409}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_30}, doi = {10.1007/978-3-540-87403-4\_30}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/RubelPABW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RubinsteinNHJLTT08, author = {Benjamin I. P. Rubinstein and Blaine Nelson and Ling Huang and Anthony D. Joseph and Shing{-}hon Lau and Nina Taft and J. Doug Tygar}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Evading Anomaly Detection through Variance Injection Attacks on {PCA}}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {394--395}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_23}, doi = {10.1007/978-3-540-87403-4\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RubinsteinNHJLTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchearAB08, author = {Nabil Schear and David R. Albrecht and Nikita Borisov}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {High-Speed Matching of Vulnerability Signatures}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {155--174}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_9}, doi = {10.1007/978-3-540-87403-4\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchearAB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SrivastavaG08, author = {Abhinav Srivastava and Jonathon T. Giffin}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {39--58}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_3}, doi = {10.1007/978-3-540-87403-4\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SrivastavaG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SrivastavaLG08, author = {Abhinav Srivastava and Andrea Lanzi and Jonathon T. Giffin}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {System Call {API} Obfuscation (Extended Abstract)}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {421--422}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_36}, doi = {10.1007/978-3-540-87403-4\_36}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SrivastavaLG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/StakhanovaSBW08, author = {Natalia Stakhanova and Chris Strasburg and Samik Basu and Johnny S. Wong}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {On Evaluation of Response Cost for Intrusion Response Systems}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {390--391}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_21}, doi = {10.1007/978-3-540-87403-4\_21}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/StakhanovaSBW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThonnardVLD08, author = {Olivier Thonnard and Jouni Viinikka and Corrado Leita and Marc Dacier}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Automating the Analysis of Honeypot Data (Extended Abstract)}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {406--407}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_29}, doi = {10.1007/978-3-540-87403-4\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ThonnardVLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VasiliadisAPMI08, author = {Giorgos Vasiliadis and Spyros Antonatos and Michalis Polychronakis and Evangelos P. Markatos and Sotiris Ioannidis}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Gnort: High Performance Network Intrusion Detection Using Graphics Processors}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {116--134}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_7}, doi = {10.1007/978-3-540-87403-4\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/VasiliadisAPMI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangJCW08, author = {Zhi Wang and Xuxian Jiang and Weidong Cui and Xinyuan Wang}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Countering Persistent Kernel Rootkits through Systematic Hook Discovery}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {21--38}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_2}, doi = {10.1007/978-3-540-87403-4\_2}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangJCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2008, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4}, doi = {10.1007/978-3-540-87403-4}, isbn = {978-3-540-87402-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaileyOAMJN07, author = {Michael D. Bailey and Jon Oberheide and Jon Andersen and Zhuoqing Morley Mao and Farnam Jahanian and Jose Nazario}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Automated Classification and Analysis of Internet Malware}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {178--197}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_10}, doi = {10.1007/978-3-540-74320-0\_10}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BaileyOAMJN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungM07, author = {Simon P. Chung and Aloysius K. Mok}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Advanced Allergy Attacks: Does a Corpus Really Help?}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {236--255}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_13}, doi = {10.1007/978-3-540-74320-0\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChungM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CollinsR07, author = {M. Patrick Collins and Michael K. Reiter}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {276--295}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_15}, doi = {10.1007/978-3-540-74320-0\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CollinsR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CovaBFV07, author = {Marco Cova and Davide Balzarotti and Viktoria Felmetsger and Giovanni Vigna}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {63--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_4}, doi = {10.1007/978-3-540-74320-0\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CovaBFV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/InghamI07, author = {Kenneth L. Ingham and Hajime Inoue}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Comparing Anomaly Detection Techniques for {HTTP}}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {42--62}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_3}, doi = {10.1007/978-3-540-74320-0\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/InghamI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiangW07, author = {Xuxian Jiang and Xinyuan Wang}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {198--218}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_11}, doi = {10.1007/978-3-540-74320-0\_11}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JiangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LangeDB07, author = {John R. Lange and Peter A. Dinda and Fabi{\'{a}}n E. Bustamante}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {317--336}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_17}, doi = {10.1007/978-3-540-74320-0\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LangeDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiWC07, author = {Zhuowei Li and XiaoFeng Wang and Jong Youl Choi}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {SpyShield: Preserving Privacy from Spy Add-Ons}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {296--316}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_16}, doi = {10.1007/978-3-540-74320-0\_16}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiWC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaggiZ07, author = {Federico Maggi and Stefano Zanero}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {On the Use of Different Statistical Tests for Alert Correlation - Short Paper}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {167--177}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_9}, doi = {10.1007/978-3-540-74320-0\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaggiZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaloofS07, author = {Marcus A. Maloof and Gregory D. Stephens}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {elicit: {A} System for Detecting Insiders Who Violate Need-to-Know}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {146--166}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_8}, doi = {10.1007/978-3-540-74320-0\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaloofS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MutzRVK07, author = {Darren Mutz and William K. Robertson and Giovanni Vigna and Richard A. Kemmerer}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Exploiting Execution Context for the Detection of Anomalous System Calls}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {1--20}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_1}, doi = {10.1007/978-3-540-74320-0\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MutzRVK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PolychronakisAM07, author = {Michalis Polychronakis and Kostas G. Anagnostakis and Evangelos P. Markatos}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Emulation-Based Detection of Non-self-contained Polymorphic Shellcode}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {87--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_5}, doi = {10.1007/978-3-540-74320-0\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PolychronakisAM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SharifSGL07, author = {Monirul Islam Sharif and Kapil Singh and Jonathon T. Giffin and Wenke Lee}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Understanding Precision in Host Based Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {21--41}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_2}, doi = {10.1007/978-3-540-74320-0\_2}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SharifSGL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ToddRBMR07, author = {Adam D. Todd and Richard A. Raines and Rusty O. Baldwin and Barry E. Mullins and Steven K. Rogers}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Alert Verification Evasion Through Server Response Forging}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {256--275}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_14}, doi = {10.1007/978-3-540-74320-0\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ToddRBMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VallentinSLLPT07, author = {Matthias Vallentin and Robin Sommer and Jason Lee and Craig Leres and Vern Paxson and Brian Tierney}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {The {NIDS} Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {107--126}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_6}, doi = {10.1007/978-3-540-74320-0\_6}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VallentinSLLPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangTLB07, author = {Shiau{-}Huey Wang and Chinyang Henry Tseng and Karl N. Levitt and Matt Bishop}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {127--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_7}, doi = {10.1007/978-3-540-74320-0\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangTLB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WilhelmC07, author = {Jeffrey Wilhelm and Tzi{-}cker Chiueh}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {A Forced Sampled Execution Approach to Kernel Rootkit Identification}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {219--235}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_12}, doi = {10.1007/978-3-540-74320-0\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WilhelmC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2007, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0}, doi = {10.1007/978-3-540-74320-0}, isbn = {978-3-540-74319-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ArnesVVK06, author = {Andr{\'{e}} {\AA}rnes and Fredrik Valeur and Giovanni Vigna and Richard A. Kemmerer}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Using Hidden Markov Models to Evaluate the Risks of Intrusions}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {145--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_8}, doi = {10.1007/11856214\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ArnesVVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaecherKHDF06, author = {Paul Baecher and Markus Koetter and Thorsten Holz and Maximillian Dornseif and Felix C. Freiling}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {The Nepenthes Platform: An Efficient Approach to Collect Malware}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {165--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_9}, doi = {10.1007/11856214\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BruijnSRHXB06, author = {Willem de Bruijn and Asia Slowinska and Kees van Reeuwijk and Tom{\'{a}}s Hrub{\'{y}} and Li Xu and Herbert Bos}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {SafeCard: {A} Gigabit {IPS} on the Network Card}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {311--330}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_16}, doi = {10.1007/11856214\_16}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BruijnSRHXB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungM06, author = {Simon P. Chung and Aloysius K. Mok}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Allergy Attack Against Automatic Signature Generation}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {61--80}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_4}, doi = {10.1007/11856214\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChungM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaoRS06, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Behavioral Distance Measurement Using Hidden Markov Models}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {19--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_2}, doi = {10.1007/11856214\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GaoRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GiffinJM06, author = {Jonathon T. Giffin and Somesh Jha and Barton P. Miller}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Automated Discovery of Mimicry Attacks}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {41--60}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_3}, doi = {10.1007/11856214\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GiffinJM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GonzalezP06, author = {Jos{\'{e}} M. Gonz{\'{a}}lez and Vern Paxson}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Enhancing Network Intrusion Detection with Integrated Sampling and Filtering}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {272--289}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_14}, doi = {10.1007/11856214\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GonzalezP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HansenTM06, author = {Jeffery P. Hansen and Kymie M. C. Tan and Roy A. Maxion}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Anomaly Detector Performance Evaluation Using a Parameterized Environment}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {106--126}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_6}, doi = {10.1007/11856214\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HansenTM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LeitaDM06, author = {Corrado Leita and Marc Dacier and Fr{\'{e}}d{\'{e}}ric Massicotte}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {185--205}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_10}, doi = {10.1007/11856214\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LeitaDM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MehtaBZCW06, author = {Vaibhav Mehta and Constantinos Bartzis and Haifeng Zhu and Edmund M. Clarke and Jeannette M. Wing}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Ranking Attack Graphs}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {127--144}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_7}, doi = {10.1007/11856214\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MehtaBZCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NewsomeKS06, author = {James Newsome and Brad Karp and Dawn Xiaodong Song}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Paragraph: Thwarting Signature Learning by Training Maliciously}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {81--105}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_5}, doi = {10.1007/11856214\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NewsomeKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RajabMT06, author = {Moheeb Abu Rajab and Fabian Monrose and Andreas Terzis}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Fast and Evasive Attacks: Highlighting the Challenges Ahead}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {206--225}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_11}, doi = {10.1007/11856214\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RajabMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SinhaJP06, author = {Sushant Sinha and Farnam Jahanian and Jignesh M. Patel}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {{WIND:} Workload-Aware INtrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {290--310}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_15}, doi = {10.1007/11856214\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SinhaJP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TreinenT06, author = {James J. Treinen and Ramakrishna Thurimella}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {1--18}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_1}, doi = {10.1007/11856214\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TreinenT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TsengWKL06, author = {Chinyang Henry Tseng and Shiau{-}Huey Wang and Calvin Ko and Karl N. Levitt}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {{DEMEM:} Distributed Evidence-Driven Message Exchange Intrusion Detection Model for {MANET}}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {249--271}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_13}, doi = {10.1007/11856214\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TsengWKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangPS06, author = {Ke Wang and Janak J. Parekh and Salvatore J. Stolfo}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Anagram: {A} Content Anomaly Detector Resistant to Mimicry Attack}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {226--248}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_12}, doi = {10.1007/11856214\_12}, timestamp = {Thu, 24 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2005, editor = {Alfonso Valdes and Diego Zamboni}, title = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11663812}, doi = {10.1007/11663812}, isbn = {3-540-31778-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2006, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214}, doi = {10.1007/11856214}, isbn = {3-540-39723-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BosH05, author = {Herbert Bos and Kaiming Huang}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {102--123}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_6}, doi = {10.1007/11663812\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BosH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChinchaniB05, author = {Ramkumar Chinchani and Eric van den Berg}, editor = {Alfonso Valdes and Diego Zamboni}, title = {A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {284--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_15}, doi = {10.1007/11663812\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChinchaniB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungM05, author = {Simon P. Chung and Aloysius K. Mok}, editor = {Alfonso Valdes and Diego Zamboni}, title = {On Random-Inspection-Based Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {165--184}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_9}, doi = {10.1007/11663812\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChungM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaoRS05, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Behavioral Distance for Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {63--81}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_4}, doi = {10.1007/11663812\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GaoRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GiffinDJLM05, author = {Jonathon T. Giffin and David Dagon and Somesh Jha and Wenke Lee and Barton P. Miller}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Environment-Sensitive Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {185--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_10}, doi = {10.1007/11663812\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GiffinDJLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GuoC05, author = {Fanglu Guo and Tzi{-}cker Chiueh}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Sequence Number-Based {MAC} Address Spoof Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {309--329}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_16}, doi = {10.1007/11663812\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GuoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HongW05, author = {Seung{-}Sun Hong and Shyhtsun Felix Wu}, editor = {Alfonso Valdes and Diego Zamboni}, title = {On Interactive Internet Traffic Replay}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {247--264}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_13}, doi = {10.1007/11663812\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HongW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiangXWS05, author = {Xuxian Jiang and Dongyan Xu and Helen J. Wang and Eugene H. Spafford}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Virtual Playgrounds for Worm Behavior Investigation}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {1--21}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_1}, doi = {10.1007/11663812\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JiangXWS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KrugelKMRV05, author = {Christopher Kr{\"{u}}gel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Polymorphic Worm Detection Using Structural Information of Executables}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {207--226}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_11}, doi = {10.1007/11663812\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LocastoWKS05, author = {Michael E. Locasto and Ke Wang and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Alfonso Valdes and Diego Zamboni}, title = {{FLIPS:} Hybrid Adaptive Intrusion Prevention}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {82--101}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_5}, doi = {10.1007/11663812\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LocastoWKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MuelderMB05, author = {Chris Muelder and Kwan{-}Liu Ma and Tony Bartoletti}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Interactive Visualization for Network and Port Scan Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {265--283}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_14}, doi = {10.1007/11663812\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MuelderMB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PietraszekB05, author = {Tadeusz Pietraszek and Chris Vanden Berghe}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Defending Against Injection Attacks Through Context-Sensitive String Evaluation}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {124--145}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_7}, doi = {10.1007/11663812\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PietraszekB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SufatrioY05, author = {Sufatrio and Roland H. C. Yap}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Improving Host-Based {IDS} with Argument Abstraction to Prevent Mimicry Attacks}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {146--164}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_8}, doi = {10.1007/11663812\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SufatrioY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TotelMM05, author = {Eric Totel and Fr{\'{e}}d{\'{e}}ric Majorczyk and Ludovic M{\'{e}}}, editor = {Alfonso Valdes and Diego Zamboni}, title = {{COTS} Diversity Based Intrusion Detection and Application to Web Servers}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {43--62}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_3}, doi = {10.1007/11663812\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TotelMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TsengSBKL05, author = {Chinyang Henry Tseng and Tao Song and Poornima Balasubramanyam and Calvin Ko and Karl N. Levitt}, editor = {Alfonso Valdes and Diego Zamboni}, title = {A Specification-Based Intrusion Detection Model for {OLSR}}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {330--350}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_17}, doi = {10.1007/11663812\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TsengSBKL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangCS05, author = {Ke Wang and Gabriela F. Cretu and Salvatore J. Stolfo}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Anomalous Payload-Based Worm Detection and Signature Generation}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {227--246}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_12}, doi = {10.1007/11663812\_12}, timestamp = {Thu, 24 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WongBSW05, author = {Cynthia Wong and Stan Bielski and Ahren Studer and Chenxi Wang}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Empirical Analysis of Rate Limiting Mechanisms}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {22--42}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_2}, doi = {10.1007/11663812\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WongBSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BlumSV04, author = {Avrim Blum and Dawn Xiaodong Song and Shobha Venkataraman}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {258--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_14}, doi = {10.1007/978-3-540-30143-1\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BlumSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DagonQGLGLO04, author = {David Dagon and Xinzhou Qin and Guofei Gu and Wenke Lee and Julian B. Grizzard and John G. Levine and Henry L. Owen}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {HoneyStat: Local Worm Detection Using Honeypots}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {39--58}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_3}, doi = {10.1007/978-3-540-30143-1\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DagonQGLGLO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GehaniK04, author = {Ashish Gehani and Gershon Kedem}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {RheoStat: Real-Time Risk Management}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {296--314}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_16}, doi = {10.1007/978-3-540-30143-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GehaniK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HernackiBL04, author = {Brian Hernacki and Jeremy Bennett and Thomas Lofgren}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Symantec Deception Server Experience with a Commercial Deception System}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {188--202}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_10}, doi = {10.1007/978-3-540-30143-1\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HernackiBL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HuM04, author = {Ruiqi Hu and Aloysius K. Mok}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Detecting Unknown Massive Mailing Viruses Using Proactive Methods}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {82--101}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_5}, doi = {10.1007/978-3-540-30143-1\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HuM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HuangL04, author = {Yi{-}an Huang and Wenke Lee}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Attack Analysis and Detection for Ad Hoc Routing Protocols}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {125--145}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_7}, doi = {10.1007/978-3-540-30143-1\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HuangL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LamC04, author = {Lap{-}Chung Lam and Tzi{-}cker Chiueh}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Automatic Extraction of Accurate Application-Specific Sandboxing Policy}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {1--20}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_1}, doi = {10.1007/978-3-540-30143-1\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LamC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OkaOAK04, author = {Mizuki Oka and Yoshihiro Oyama and Hirotake Abe and Kazuhiko Kato}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {223--237}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_12}, doi = {10.1007/978-3-540-30143-1\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OkaOAK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Pietraszek04, author = {Tadeusz Pietraszek}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {102--124}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_6}, doi = {10.1007/978-3-540-30143-1\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Pietraszek04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchechterJB04, author = {Stuart E. Schechter and Jaeyeon Jung and Arthur W. Berger}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Fast Detection of Scanning Worm Infections}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {59--81}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_4}, doi = {10.1007/978-3-540-30143-1\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchechterJB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SongKAZL04, author = {Tao Song and Calvin Ko and Jim Alves{-}Foss and Cui Zhang and Karl N. Levitt}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Formal Reasoning About Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {278--295}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_15}, doi = {10.1007/978-3-540-30143-1\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SongKAZL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ViinikkaD04, author = {Jouni Viinikka and Herv{\'{e}} Debar}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Monitoring {IDS} Background Noise Using {EWMA} Control Charts and Alert Information}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {166--187}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_9}, doi = {10.1007/978-3-540-30143-1\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ViinikkaD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangS04, author = {Ke Wang and Salvatore J. Stolfo}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Anomalous Payload-Based Network Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {203--222}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_11}, doi = {10.1007/978-3-540-30143-1\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XieKORZ04, author = {Yinglian Xie and Hyang{-}Ah Kim and David R. O'Hallaron and Michael K. Reiter and Hui Zhang}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Seurat: {A} Pointillist Approach to Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {238--257}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_13}, doi = {10.1007/978-3-540-30143-1\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XieKORZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuDC04, author = {Haizhi Xu and Wenliang Du and Steve J. Chapin}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {21--38}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_2}, doi = {10.1007/978-3-540-30143-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuDC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YegneswaranBP04, author = {Vinod Yegneswaran and Paul Barford and David Plonka}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {On the Design and Use of Internet Sinks for Network Abuse Monitoring}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {146--165}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_8}, doi = {10.1007/978-3-540-30143-1\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YegneswaranBP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2004, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b100714}, doi = {10.1007/B100714}, isbn = {3-540-23123-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BalepinMRL03, author = {Ivan Balepin and Sergei Maltsev and Jeff Rowe and Karl N. Levitt}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Using Specification-Based Intrusion Detection for Automated Response}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {136--154}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_8}, doi = {10.1007/978-3-540-45248-5\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BalepinMRL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChoH03, author = {Sung{-}Bae Cho and Sang{-}Jun Han}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {207--219}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_12}, doi = {10.1007/978-3-540-45248-5\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChoH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GuptaS03, author = {Ajay Gupta and R. Sekar}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {An Approach for Detecting Self-propagating Email Using Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {55--72}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_4}, doi = {10.1007/978-3-540-45248-5\_4}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GuptaS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruegelMRV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and William K. Robertson and Fredrik Valeur}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Topology-Based Detection of Anomalous {BGP} Messages}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {17--35}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_2}, doi = {10.1007/978-3-540-45248-5\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KruegelMRV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruegelT03, author = {Christopher Kr{\"{u}}gel and Thomas Toth}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Using Decision Trees to Improve Signature-Based Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {173--191}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_10}, doi = {10.1007/978-3-540-45248-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KruegelT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MahoneyC03, author = {Matthew V. Mahoney and Philip K. Chan}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {220--237}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_13}, doi = {10.1007/978-3-540-45248-5\_13}, timestamp = {Wed, 14 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MahoneyC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MorinD03, author = {Benjamin Morin and Herv{\'{e}} Debar}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Correlation of Intrusion Symptoms: An Application of Chronicles}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {94--112}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_6}, doi = {10.1007/978-3-540-45248-5\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MorinD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/QinL03, author = {Xinzhou Qin and Wenke Lee}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Statistical Causality Analysis of {INFOSEC} Alert Data}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {73--93}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_5}, doi = {10.1007/978-3-540-45248-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/QinL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RamadasOT03, author = {Manikantan Ramadas and Shawn Ostermann and Brett C. Tjaden}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Detecting Anomalous Network Traffic with Self-organizing Maps}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {36--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_3}, doi = {10.1007/978-3-540-45248-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RamadasOT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchaelickeSMF03, author = {Lambert Schaelicke and Thomas Slabach and Branden J. Moore and Curt Freeland}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Characterizing the Performance of Network Intrusion Detection Sensors}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {155--172}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_9}, doi = {10.1007/978-3-540-45248-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchaelickeSMF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Taleck03, author = {Greg Taleck}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Ambiguity Resolution via Passive {OS} Fingerprinting}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {192--206}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_11}, doi = {10.1007/978-3-540-45248-5\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Taleck03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TylutkiL03, author = {Marcus Tylutki and Karl N. Levitt}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {1--16}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_1}, doi = {10.1007/978-3-540-45248-5\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TylutkiL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/UndercofferJP03, author = {Jeffrey Undercoffer and Anupam Joshi and John Pinkston}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Modeling Computer Attacks: An Ontology for Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {113--135}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_7}, doi = {10.1007/978-3-540-45248-5\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/UndercofferJP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2003, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b13476}, doi = {10.1007/B13476}, isbn = {3-540-40878-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ApapHHES02, author = {Frank Apap and Andrew Honig and Shlomo Hershkop and Eleazar Eskin and Salvatore J. Stolfo}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {36--53}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_3}, doi = {10.1007/3-540-36084-0\_3}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/raid/ApapHHES02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DebarM02, author = {Herv{\'{e}} Debar and Benjamin Morin}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {177--198}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_10}, doi = {10.1007/3-540-36084-0\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/DebarM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DonohoFSPCS02, author = {David L. Donoho and Ana Georgina Flesia and Umesh Shankar and Vern Paxson and Jason Coit and Stuart Staniford}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {17--35}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_2}, doi = {10.1007/3-540-36084-0\_2}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DonohoFSPCS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Goldman02, author = {Robert P. Goldman}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {A Stochastic Model for Intrusions}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {199--218}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_11}, doi = {10.1007/3-540-36084-0\_11}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Goldman02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GorodetskiK02, author = {Vladimir I. Gorodetski and Igor V. Kotenko}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {219--238}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_12}, doi = {10.1007/3-540-36084-0\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GorodetskiK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HallW02, author = {Mike Hall and Kevin Wiley}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Capacity Verification for High Speed Network Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {239--251}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_13}, doi = {10.1007/3-540-36084-0\_13}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HallW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Johnston02, author = {Steven R. Johnston}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Development of a Legal Framework for Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {138--157}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_8}, doi = {10.1007/3-540-36084-0\_8}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Johnston02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JustRCDLMR02, author = {James E. Just and James C. Reynolds and Larry A. Clough and Melissa Danforth and Karl N. Levitt and Ryan Maglich and Jeff Rowe}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Learning Unknown Attacks - {A} Start}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {158--176}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_9}, doi = {10.1007/3-540-36084-0\_9}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JustRCDLMR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LeeCTBSZ02, author = {Wenke Lee and Jo{\~{a}}o B. D. Cabrera and Ashley Thomas and Niranjan Balwalli and Sunmeet Saluja and Yi Zhang}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Performance Adaptation in Real-Time Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {252--273}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_14}, doi = {10.1007/3-540-36084-0\_14}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LeeCTBSZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LippmannWS02, author = {Richard Lippmann and Seth E. Webster and Douglas Stetson}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {307--326}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_17}, doi = {10.1007/3-540-36084-0\_17}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LippmannWS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MorinMDD02, author = {Benjamin Morin and Ludovic M{\'{e}} and Herv{\'{e}} Debar and Mireille Ducass{\'{e}}}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {{M2D2:} {A} Formal Data Model for {IDS} Alert Correlation}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {115--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_7}, doi = {10.1007/3-540-36084-0\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MorinMDD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NingCR02, author = {Peng Ning and Yun Cui and Douglas S. Reeves}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Analyzing Intensive Intrusion Alerts via Correlation}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {74--94}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_5}, doi = {10.1007/3-540-36084-0\_5}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NingCR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PorrasFV02, author = {Phillip A. Porras and Martin W. Fong and Alfonso Valdes}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {A Mission-Impact-Based Approach to {INFOSEC} Alarm Correlation}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {95--114}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_6}, doi = {10.1007/3-540-36084-0\_6}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PorrasFV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TanKM02, author = {Kymie M. C. Tan and Kevin S. Killourhy and Roy A. Maxion}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {54--73}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_4}, doi = {10.1007/3-540-36084-0\_4}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TanKM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TothK02, author = {Thomas Toth and Christopher Kr{\"{u}}gel}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Accurate Buffer Overflow Detection via Abstract Payload Execution}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {274--291}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_15}, doi = {10.1007/3-540-36084-0\_15}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TothK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Yung02, author = {Kwong H. Yung}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Detecting Long Connection Chains of Interactive Terminal Sessions}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_1}, doi = {10.1007/3-540-36084-0\_1}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Yung02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZimmermannMB02, author = {Jacob Zimmermann and Ludovic M{\'{e}} and Christophe Bidan}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Introducing Reference Flow Control for Detecting Intrusion Symptoms at the {OS} Level}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {292--306}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_16}, doi = {10.1007/3-540-36084-0\_16}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZimmermannMB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2002, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0}, doi = {10.1007/3-540-36084-0}, isbn = {3-540-00020-8}, timestamp = {Sat, 07 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlmgrenL01, author = {Magnus Almgren and Ulf Lindqvist}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Application-Integrated Data Collection for Security Monitoring}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {22--36}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_2}, doi = {10.1007/3-540-45474-8\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/AlmgrenL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CunninghamS01, author = {Robert K. Cunningham and Craig S. Stevenson}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Accurately Detecting Source Code of Attacks That Increase Privilege}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {104--116}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_7}, doi = {10.1007/3-540-45474-8\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CunninghamS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DebarW01, author = {Herv{\'{e}} Debar and Andreas Wespi}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Aggregation and Correlation of Intrusion-Detection Alerts}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {85--103}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_6}, doi = {10.1007/3-540-45474-8\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DebarW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Johnston01, author = {Steven R. Johnston}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {150--171}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_10}, doi = {10.1007/3-540-45474-8\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Johnston01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KoBRTL01, author = {Calvin Ko and Paul Brutch and Jeff Rowe and Guy Tsafnat and Karl N. Levitt}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {System Health and Intrusion Monitoring Using a Hierarchy of Constraints}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {190--204}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_12}, doi = {10.1007/3-540-45474-8\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KoBRTL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PouzolD01, author = {Jean{-}Philippe Pouzol and Mireille Ducass{\'{e}}}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {From Declarative Signatures to Misuse {IDS}}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {1--21}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_1}, doi = {10.1007/3-540-45474-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PouzolD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SterneDWBSHR01, author = {Daniel F. Sterne and Kelly Djahandari and Brett Wilson and Bill Babson and Dan Schnackenberg and Harley Holliday and Travis Reid}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Autonomic Response to Distributed Denial of Service Attacks}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {134--149}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_9}, doi = {10.1007/3-540-45474-8\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SterneDWBSHR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/UppuluriS01, author = {Prem Uppuluri and R. Sekar}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Experiences with Specification-Based Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {172--189}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_11}, doi = {10.1007/3-540-45474-8\_11}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/UppuluriS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ValdesS01, author = {Alfonso Valdes and Keith Skinner}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Probabilistic Alert Correlation}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {54--68}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_4}, doi = {10.1007/3-540-45474-8\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ValdesS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VignaKB01, author = {Giovanni Vigna and Richard A. Kemmerer and Per Blix}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Designing a Web of Highly-Configurable Intrusion Detection Sensors}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {69--84}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_5}, doi = {10.1007/3-540-45474-8\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VignaKB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WelzH01, author = {Marc G. Welz and Andrew Hutchison}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Interfacing Trusted Applications with Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {37--53}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_3}, doi = {10.1007/3-540-45474-8\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WelzH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WilliamsABGL01, author = {Paul D. Williams and Kevin P. Anchor and John L. Bebo and Gregg H. Gunsch and Gary B. Lamont}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {{CDIS:} Towards a Computer Immune System for Detecting Network Intrusions}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {117--133}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_8}, doi = {10.1007/3-540-45474-8\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WilliamsABGL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2001, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8}, doi = {10.1007/3-540-45474-8}, isbn = {3-540-42702-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Alessandri00, author = {Dominique Alessandri}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {183--196}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_12}, doi = {10.1007/3-540-39945-3\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/Alessandri00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BiskupF00, author = {Joachim Biskup and Ulrich Flegel}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {28--48}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_3}, doi = {10.1007/3-540-39945-3\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BiskupF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CuppensO00, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Rodolphe Ortalo}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {{LAMBDA:} {A} Language to Model a Database for Detection of Attacks}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {197--216}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_13}, doi = {10.1007/3-540-39945-3\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CuppensO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FlackA00, author = {Chapman Flack and Mikhail J. Atallah}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Better Logging through Formality}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {1--16}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_1}, doi = {10.1007/3-540-39945-3\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FlackA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GhoshMS00, author = {Anup K. Ghosh and Christoph C. Michael and Michael Schatz}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {A Real-Time Intrusion Detection System Based on Learning Program Behavior}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {93--109}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_7}, doi = {10.1007/3-540-39945-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GhoshMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KuriNMH00, author = {Josu{\'{e}} Kuri and Gonzalo Navarro and Ludovic M{\'{e}} and Laurent Heye}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {17--27}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_2}, doi = {10.1007/3-540-39945-3\_2}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/KuriNMH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LeeNYPDTS00, author = {Wenke Lee and Rahul A. Nimbalkar and Kam K. Yee and Sunil B. Patil and Pragneshkumar H. Desai and Thuan T. Tran and Salvatore J. Stolfo}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {A Data Mining and {CIDF} Based Approach for Detecting Novel and Distributed Intrusions}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {49--65}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_4}, doi = {10.1007/3-540-39945-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LeeNYPDTS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LippmannHFKD00, author = {Richard Lippmann and Joshua W. Haines and David J. Fried and Jonathan Korba and Kumar Das}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Analysis and Results of the 1999 {DARPA} Off-Line Intrusion Detection Evaluation}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {162--182}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_11}, doi = {10.1007/3-540-39945-3\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LippmannHFKD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MarrakchiMVM00, author = {Zakia Marrakchi and Ludovic M{\'{e}} and Bernard Vivinis and Benjamin Morin}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to {CORBA} Objects}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {130--144}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_9}, doi = {10.1007/3-540-39945-3\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MarrakchiMVM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/McHugh00, author = {John McHugh}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {The 1998 Lincoln Laboratory {IDS} Evaluation}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {145--161}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_10}, doi = {10.1007/3-540-39945-3\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/McHugh00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MichaelG00, author = {Christoph C. Michael and Anup K. Ghosh}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Using Finite Automata to Mine Execution Data for Intrusion Detection: {A} Preliminary Report}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {66--79}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_5}, doi = {10.1007/3-540-39945-3\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MichaelG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RiordanA00, author = {James Riordan and Dominique Alessandri}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Target Naming and Service Apoptosis}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {217--226}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_14}, doi = {10.1007/3-540-39945-3\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RiordanA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ValdesS00, author = {Alfonso Valdes and Keith Skinner}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Adaptive, Model-Based Monitoring for Cyber Attack Detection}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {80--92}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_6}, doi = {10.1007/3-540-39945-3\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ValdesS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WespiDD00, author = {Andreas Wespi and Marc Dacier and Herv{\'{e}} Debar}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Intrusion Detection Using Variable-Length Audit Trail Patterns}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {110--129}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_8}, doi = {10.1007/3-540-39945-3\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WespiDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2000, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3}, doi = {10.1007/3-540-39945-3}, isbn = {3-540-41085-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Axelsson99, author = {Stefan Axelsson}, title = {On a Difficulty of Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Axelsson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Axelsson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BakerCHM99, author = {David W. Baker and Steven M. Christey and William H. Hill and David E. Mann}, title = {The Development of a Common Vulnerability Enumeration}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Hill.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BakerCHM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Bishop99, author = {Matt Bishop}, title = {Vulnerability Analysis: An Extended Abstract}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Bishop.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Bishop99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChampionD99, author = {Terrence G. Champion and Robert Durst}, title = {Air Force Intrusion Detection System Evaluation Environment}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Champion.pdf}, timestamp = {Mon, 13 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChampionD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungGL99, author = {Christina Yip Chung and Michael Gertz and Karl N. Levitt}, title = {Misuse Detection in Database Systems Through User Profiling}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Chung.pdf}, timestamp = {Mon, 07 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ChungGL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CosendaiDS99, author = {Yves Cosendai and Marc Dacier and Paolo Scotton}, title = {Intrusion Detection Mechanism to Detect Reachability Attacks in {PNNI} Networks}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Cosendai.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/CosendaiDS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Farley99, author = {Tim Farley}, title = {Lessons Learned in Commercial {IDS} Development}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Farley.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Farley99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FeiertagSLHPCBRW99, author = {Richard J. Feiertag and Stuart Staniford{-}Chen and Karl N. Levitt and Mark R. Heckman and Dave Peticolas and Rick Crawford and Lee A. Benzinger and Sue Rho and Stephen Wu}, title = {Intrusion Detection Inter-component Adaptive Negotiation}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Feiertag.pdf}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/FeiertagSLHPCBRW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GormanR99, author = {David Gorman and Mary Ruhl}, title = {Intrusion Detection for Telephony Signalling}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Gorman.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GormanR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KelseyS99, author = {John Kelsey and Bruce Schneier}, title = {Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Kelsey.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/KelseyS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LeeS99, author = {Wenke Lee and Salvatore J. Stolfo}, title = {Combining Knowledge Discovery and Knowledge Engineering to Build IDSs}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Lee\_Stolfo.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LeeS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LippmannC99, author = {Richard Lippmann and Robert K. Cunningham}, title = {Improving Intrusion Detection Performance using Keyword Selection and Neural Networks}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LippmannC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LippmannCFGKWZ99, author = {Richard Lippmann and Robert K. Cunningham and David J. Fried and Isaac Graf and Kris R. Kendall and Seth E. Webster and Marc A. Zissman}, title = {Results of the {DARPA} 1998 Offline Intrusion Detection Evaluation}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Lippmann\_DARPA.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LippmannCFGKWZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LundinJ99, author = {Emilie Lundin and Erland Jonsson}, title = {Privacy vs. Intrusion Detection Analysis}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Lundin.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LundinJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ManganarisCZH99, author = {Stefanos Manganaris and Marvin Christensen and Dan Zerkle and Keith Hermiz}, title = {A Data Mining Analysis of {RTID} Alarms}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Manganaris.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ManganarisCZH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Mansfield99, author = {Glenn Mansfield}, title = {Towards trapping wily intruders in the large}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Mansfield.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Mansfield99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MellM99, author = {Peter Mell and Mark McLarnon}, title = {Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Mell.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MellM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Mutaf99, author = {Pars Mutaf}, title = {Defending against a Denial-of-Service Attack on {TCP}}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/ParsMutaf.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Mutaf99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OngTTT99, author = {Tiang Hwee Ong and Chung Pheng Tan and Yong Tai Tan and Christopher Ting}, title = {{SNMS} - Shadow Network Management System}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/ChungPheng.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/OngTTT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Paxson99, author = {Vern Paxson}, title = {Defending against network {IDS} evasion}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Paxson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Paxson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/QianliX99, author = {Qianli Zhang and Xing Li}, title = {Session State Transition Based Large Network {IDS}}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Qianli.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/QianliX99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/QueirozCP99, author = {Jose Duarte de Queiroz and Luiz F. Rust da Costa Carmo and Luci Pirmez}, title = {Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Queiroz.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/QueirozCP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Rowe99, author = {Jeff Rowe}, title = {Intrusion Detection and Isolation Protocol: Automated Response to Attacks}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Rowe.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Rowe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchwartzbardG99, author = {Aaron Schwartzbard and Anup K. Ghosh}, title = {A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows {NT}}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchwartzbardG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SeleznyovP99, author = {Alexandr Seleznyov and Seppo Puuronen}, title = {Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Seleznyov.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SeleznyovP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SongSU99, author = {Dug Song and G. Shaffer and M. Undy}, title = {Nidsbench - a Network Intrusion Detection Test Suite}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Song.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SongSU99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SpaffordZ99, author = {Eugene H. Spafford and Diego Zamboni}, title = {New directions for the {AAFID} architecture}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Zamboni.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/SpaffordZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Staniford-Chen99, author = {Stuart Staniford{-}Chen}, title = {{IDS} Standards: Lessons Learned to Date}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/StanifordChen.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Staniford-Chen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TingOTN99, author = {Christopher Ting and Tiang Hwee Ong and Yong Tai Tan and Pek Yong Ng}, title = {Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Ting.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/TingOTN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Wee99, author = {Christopher Wee}, title = {Audit logs: to keep or not to keep?}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Wee.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Wee99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WespiD99, author = {Andreas Wespi and Herv{\'{e}} Debar}, title = {Building an Intrusion-Detection System to Detect Suspicious Process Behavior}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Wespi.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WespiD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YuillWGH99, author = {Jim Yuill and Shyhtsun Felix Wu and Fengmin Gong and Ming{-}Yuh Huang}, title = {Intrusion Detection for an On-Going Attack}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Yuill.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YuillWGH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/1999, title = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.