Limit search to available items
Book Cover
E-book
Author RAID (Symposium) (15th : 2012 : Amsterdam, Netherlands)

Title Research in Attacks, Intrusions, and Defenses : 15th International Symposium, RAID 2012, Amsterdam, the Netherlands, September 12-14, 2012. Proceedings / Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7462
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7462.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Trusted VM Snapshots in Untrusted Cloud Infrastructures / Abhinav Srivastava, Himanshu Raj, Jonathon Giffin and Paul England -- Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection / Martim Carbone, Matthew Conover, Bruce Montague and Wenke Lee -- Assessing the Trustworthiness of Drivers / Shengzhi Zhang and Peng Liu -- Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat / Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan and Martin Lee -- Memory Errors: The Past, the Present, and the Future / Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro and Herbert Bos -- A Memory Access Validation Scheme against Payload Injection Attacks / Dongkyun Ahn and Gyungho Lee -- Dione: A Flexible Disk Monitoring and Analysis Framework / Jennifer Mankin and David Kaeli -- AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks / Zhi Xu, Hungyuan Hsu, Xin Chen, Sencun Zhu and Ali R. Hurson -- Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes / Tobias Lauinger, Engin Kirda and Pietro Michiardi
Proactive Discovery of Phishing Related Domain Names / Samuel Marchal, Jérôme François, Radu State and Thomas Engel -- Evaluating Electricity Theft Detectors in Smart Grid Networks / Daisuke Mashima and Alvaro A. Cárdenas -- PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks / Jialong Zhang, Chao Yang, Zhaoyan Xu and Guofei Gu -- DEMACRO: Defense against Malicious Cross-Domain Requests / Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens and Martin Johns -- FlashDetect: ActionScript 3 Malware Detection / Timon Van Overveldt, Christopher Kruegel and Giovanni Vigna -- ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection / Jie Chu, Zihui Ge, Richard Huber, Ping Ji and Jennifer Yates, et al. -- A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence / Bernhard Amann, Robin Sommer, Aashish Sharma and Seth Hall -- GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors / Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish and Min Sik Kim, et al
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols / Dina Hadžiosmanović, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon and Sandro Etalle -- Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract) / Shah Mahmood and Yvo Desmedt -- The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract) / Cui Xiang, Shi Jinqiao, Liao Peng and Liu Chaoge -- Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract) / Wu Jinyu, Yin Lihua and Fang Binxing -- Automatic Covert Channel Detection in Asbestos System (Poster Abstract) / Shuyuan Jin, Zhi Yang and Xiang Cui -- EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract) / Dengke Qiao, Tingwen Liu, Yong Sun and Li Guo -- Distress Detection (Poster Abstract) / Mark Vella, Sotirios Terzis and Marc Roper -- Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract) / Jenny Andrea Pinto Sánchez and Luis Javier García Villalba
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract) / Ahmed F. Shosha, Joshua I. James, Chen-Ching Liu and Pavel Gladyshev -- Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract) / Lukáš Ďurfina, Jakub Křoustek, Petr Zemek and Břetislav Kábele -- Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract) / Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Concurrency Optimization for NIDS (Poster Abstract) / Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract) / Luis Javier García Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco and Javier Martínez Puentes
Summary This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection
Analysis Computer science
Computer Communication Networks
Operating systems (Computers)
Data protection
Systems and Data Security
Operating Systems
Programming Languages, Compilers, Interpreters
e-Commerce/e-business
Information Systems Applications (incl. Internet)
computerwetenschappen
computer sciences
informatiesystemen
information systems
internet
elektronische handel
electronic commerce
programmeertalen
programming languages
gegevensbeheer
data management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Notes English
Subject Computer networks -- Security measures -- Congresses
Computer networks -- Access control -- Congresses.
Computer security -- Congresses
Informatique.
Computer networks -- Access control
Computer networks -- Security measures
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Balzarotti, Davide.
Stolfo, Salvatore J. (Salvatore Joseph)
Cova, Marco
ISBN 9783642333385
3642333389
3642333370
9783642333378
Other Titles RAID 2012