首页 > 最新文献

International Symposium on Recent Advances in Intrusion Detection最新文献

英文 中文
GRIM: Leveraging GPUs for Kernel Integrity Monitoring 利用gpu进行内核完整性监控
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_1
Lazaros Koromilas, G. Vasiliadis, E. Athanasopoulos, S. Ioannidis
{"title":"GRIM: Leveraging GPUs for Kernel Integrity Monitoring","authors":"Lazaros Koromilas, G. Vasiliadis, E. Athanasopoulos, S. Ioannidis","doi":"10.1007/978-3-319-45719-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_1","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116610015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Uses and Abuses of Server-Side Requests 服务器端请求的使用和滥用
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_18
Giancarlo Pellegrino, Onur Catakoglu, D. Balzarotti, C. Rossow
{"title":"Uses and Abuses of Server-Side Requests","authors":"Giancarlo Pellegrino, Onur Catakoglu, D. Balzarotti, C. Rossow","doi":"10.1007/978-3-319-45719-2_18","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_18","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the Feasibility of TTL-Based Filtering for DRDoS Mitigation 基于ttl的DRDoS过滤可行性研究
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_14
M. Backes, Thorsten Holz, C. Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
{"title":"On the Feasibility of TTL-Based Filtering for DRDoS Mitigation","authors":"M. Backes, Thorsten Holz, C. Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock","doi":"10.1007/978-3-319-45719-2_14","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_14","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance 通过细粒度的Web内容来源识别基于扩展的广告注入
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_19
Sajjad Arshad, Amin Kharraz, William K. Robertson
{"title":"Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance","authors":"Sajjad Arshad, Amin Kharraz, William K. Robertson","doi":"10.1007/978-3-319-45719-2_19","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_19","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Formal Framework for Environmentally Sensitive Malware 环境敏感型恶意软件的正式框架
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_10
Jeremy Blackthorne, Benjamin Kaiser, B. Yener
{"title":"A Formal Framework for Environmentally Sensitive Malware","authors":"Jeremy Blackthorne, Benjamin Kaiser, B. Yener","doi":"10.1007/978-3-319-45719-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_10","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion SandPrint:指纹恶意软件沙箱,为沙箱规避提供情报
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_8
Akira Yokoyama, Kou Ishii, Rui Tanabe, Y. Papa, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, Michael Brengel, M. Backes, C. Rossow
{"title":"SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion","authors":"Akira Yokoyama, Kou Ishii, Rui Tanabe, Y. Papa, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, Michael Brengel, M. Backes, C. Rossow","doi":"10.1007/978-3-319-45719-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_8","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128110296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Detecting Stack Layout Corruptions with Robust Stack Unwinding 利用鲁棒堆栈展开检测堆栈布局损坏
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_4
Yangchun Fu, J. Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
{"title":"Detecting Stack Layout Corruptions with Robust Stack Unwinding","authors":"Yangchun Fu, J. Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang","doi":"10.1007/978-3-319-45719-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_4","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Look into 30 Years of Malware Development from a Software Metrics Perspective 从软件度量的角度看30年的恶意软件开发
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_15
Alejandro Calleja, J. Tapiador, Juan Caballero
{"title":"A Look into 30 Years of Malware Development from a Software Metrics Perspective","authors":"Alejandro Calleja, J. Tapiador, Juan Caballero","doi":"10.1007/978-3-319-45719-2_15","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_15","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Trellis: Privilege Separation for Multi-user Applications Made Easy Trellis:使多用户应用程序的权限分离变得简单
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_20
Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William K. Robertson, E. Kirda, F. Maggi, S. Zanero
{"title":"Trellis: Privilege Separation for Multi-user Applications Made Easy","authors":"Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William K. Robertson, E. Kirda, F. Maggi, S. Zanero","doi":"10.1007/978-3-319-45719-2_20","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_20","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection 信使回击:基于网络运营商的IMSI捕获检测
Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_13
Adrian Dabrowski, G. Petzl, E. Weippl
{"title":"The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection","authors":"Adrian Dabrowski, G. Petzl, E. Weippl","doi":"10.1007/978-3-319-45719-2_13","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_13","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127411220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
International Symposium on Recent Advances in Intrusion Detection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1