首页 > 最新文献

International Symposium on Recent Advances in Intrusion Detection最新文献

英文 中文
LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization 实用的侧通道弹性核空间随机化
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_11
David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, A. Sadeghi
{"title":"LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization","authors":"David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, A. Sadeghi","doi":"10.1007/978-3-319-66332-6_11","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_11","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level 通过数据海洋过滤恶意:通信服务提供商级别的大规模PHA安装检测
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_8
Kai Chen, Tongxin Li, Bin Ma, Peng Wang, Xiaofeng Wang, P. Zong
{"title":"Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level","authors":"Kai Chen, Tongxin Li, Bin Ma, Peng Wang, Xiaofeng Wang, P. Zong","doi":"10.1007/978-3-319-66332-6_8","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_8","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129596270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis 终端上的镜头:通过终端数据分析寻找恶意软件
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_4
A. S. Buyukkayhan, Alina Oprea, Zhou Li, William K. Robertson
{"title":"Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis","authors":"A. S. Buyukkayhan, Alina Oprea, Zhou Li, William K. Robertson","doi":"10.1007/978-3-319-66332-6_4","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_4","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129909862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage Scotch:结合Software Guard扩展和系统管理模式,监控云资源使用情况
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_18
Kevin Leach, Fengwei Zhang, Westley Weimer
{"title":"Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage","authors":"Kevin Leach, Fengwei Zhang, Westley Weimer","doi":"10.1007/978-3-319-66332-6_18","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_18","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"76 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Linking Amplification DDoS Attacks to Booter Services 放大型DDoS攻击与启动服务关联
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_19
Johannes Krupp, Mohammad Karami, C. Rossow, Damon McCoy, M. Backes
{"title":"Linking Amplification DDoS Attacks to Booter Services","authors":"Johannes Krupp, Mohammad Karami, C. Rossow, Damon McCoy, M. Backes","doi":"10.1007/978-3-319-66332-6_19","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_19","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Trapped by the UI: The Android Case 受困于UI: Android案例
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_15
Efthymios Alepis, C. Patsakis
{"title":"Trapped by the UI: The Android Case","authors":"Efthymios Alepis, C. Patsakis","doi":"10.1007/978-3-319-66332-6_15","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_15","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133553062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps 在Android混合应用中精确和可扩展地审查JavaScript桥
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_7
Guangliang Yang, Abner Mendoza, Jialong Zhang, G. Gu
{"title":"Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps","authors":"Guangliang Yang, Abner Mendoza, Jialong Zhang, G. Gu","doi":"10.1007/978-3-319-66332-6_7","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_7","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"483 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114279512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Stealth Loader: Trace-Free Program Loading for API Obfuscation 隐形加载器:跟踪无程序加载API混淆
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_10
Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, T. Yada
{"title":"Stealth Loader: Trace-Free Program Loading for API Obfuscation","authors":"Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, T. Yada","doi":"10.1007/978-3-319-66332-6_10","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_10","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems 基于openflow的SDN系统中的自动攻击发现
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_14
Samuel Jero, Xiangyu Bu, C. Nita-Rotaru, Hamed Okhravi, R. Skowyra, S. Fahmy
{"title":"BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems","authors":"Samuel Jero, Xiangyu Bu, C. Nita-Rotaru, Hamed Okhravi, R. Skowyra, S. Fahmy","doi":"10.1007/978-3-319-66332-6_14","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_14","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises 用别人的钱挖矿:减少云和企业中的隐蔽挖矿操作
Pub Date : 2017-09-18 DOI: 10.1007/978-3-319-66332-6_13
Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, M. Caesar, N. Borisov
{"title":"Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises","authors":"Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, M. Caesar, N. Borisov","doi":"10.1007/978-3-319-66332-6_13","DOIUrl":"https://doi.org/10.1007/978-3-319-66332-6_13","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124870035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
期刊
International Symposium on Recent Advances in Intrusion Detection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1