Pub Date : 2018-09-10DOI: 10.1007/978-3-030-00470-5_18
Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, W. Lou
{"title":"CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices","authors":"Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, W. Lou","doi":"10.1007/978-3-030-00470-5_18","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_18","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-10DOI: 10.1007/978-3-030-00470-5_8
Menghao Zhang, Guanyu Li, Lei Xu, J. Bi, G. Gu, Jia-Ju Bai
{"title":"Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures","authors":"Menghao Zhang, Guanyu Li, Lei Xu, J. Bi, G. Gu, Jia-Ju Bai","doi":"10.1007/978-3-030-00470-5_8","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_8","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127134621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-10DOI: 10.1007/978-3-030-00470-5_31
Bin Shi, Lei Cui, B. Li, Xudong Liu, Zhiyu Hao, Haiying Shen
{"title":"ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation","authors":"Bin Shi, Lei Cui, B. Li, Xudong Liu, Zhiyu Hao, Haiying Shen","doi":"10.1007/978-3-030-00470-5_31","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_31","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125710399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-10DOI: 10.1007/978-3-030-00470-5_28
Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk
{"title":"PostScript Undead: Pwning the Web with a 35 Years Old Language","authors":"Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk","doi":"10.1007/978-3-030-00470-5_28","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_28","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122544905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-10DOI: 10.1007/978-3-030-00470-5_9
Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, E. Weippl
{"title":"Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids","authors":"Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, E. Weippl","doi":"10.1007/978-3-030-00470-5_9","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_9","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132440489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-10DOI: 10.1007/978-3-030-00470-5_7
Jonas Bushart, C. Rossow
{"title":"DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives","authors":"Jonas Bushart, C. Rossow","doi":"10.1007/978-3-030-00470-5_7","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_7","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-13DOI: 10.1007/978-3-030-00470-5_11
Binghui Wang, Le Zhang, N. Gong
{"title":"SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels","authors":"Binghui Wang, Le Zhang, N. Gong","doi":"10.1007/978-3-030-00470-5_11","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_11","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-20DOI: 10.1007/978-3-030-00470-5_32
Zhi Zhang, Yueqiang Cheng, S. Nepal, Dongxi Liu, Qingni Shen, F. Rabhi
{"title":"KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels","authors":"Zhi Zhang, Yueqiang Cheng, S. Nepal, Dongxi Liu, Qingni Shen, F. Rabhi","doi":"10.1007/978-3-030-00470-5_32","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_32","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-22DOI: 10.1007/978-3-030-00470-5_19
Julian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, M. Franz
{"title":"PartiSan: Fast and Flexible Sanitization via Run-time Partitioning","authors":"Julian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, M. Franz","doi":"10.1007/978-3-030-00470-5_19","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_19","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-18DOI: 10.1007/978-3-319-66332-6_5
Amin Kharraz, E. Kirda
{"title":"Redemption: Real-Time Protection Against Ransomware at End-Hosts","authors":"Amin Kharraz, E. Kirda","doi":"10.1007/978-3-319-66332-6_5","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_5","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}