Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_1
Lazaros Koromilas, G. Vasiliadis, E. Athanasopoulos, S. Ioannidis
{"title":"GRIM: Leveraging GPUs for Kernel Integrity Monitoring","authors":"Lazaros Koromilas, G. Vasiliadis, E. Athanasopoulos, S. Ioannidis","doi":"10.1007/978-3-319-45719-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_1","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116610015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_18
Giancarlo Pellegrino, Onur Catakoglu, D. Balzarotti, C. Rossow
{"title":"Uses and Abuses of Server-Side Requests","authors":"Giancarlo Pellegrino, Onur Catakoglu, D. Balzarotti, C. Rossow","doi":"10.1007/978-3-319-45719-2_18","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_18","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_14
M. Backes, Thorsten Holz, C. Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
{"title":"On the Feasibility of TTL-Based Filtering for DRDoS Mitigation","authors":"M. Backes, Thorsten Holz, C. Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock","doi":"10.1007/978-3-319-45719-2_14","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_14","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"86 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_19
Sajjad Arshad, Amin Kharraz, William K. Robertson
{"title":"Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance","authors":"Sajjad Arshad, Amin Kharraz, William K. Robertson","doi":"10.1007/978-3-319-45719-2_19","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_19","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_10
Jeremy Blackthorne, Benjamin Kaiser, B. Yener
{"title":"A Formal Framework for Environmentally Sensitive Malware","authors":"Jeremy Blackthorne, Benjamin Kaiser, B. Yener","doi":"10.1007/978-3-319-45719-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_10","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_8
Akira Yokoyama, Kou Ishii, Rui Tanabe, Y. Papa, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, Michael Brengel, M. Backes, C. Rossow
{"title":"SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion","authors":"Akira Yokoyama, Kou Ishii, Rui Tanabe, Y. Papa, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, Michael Brengel, M. Backes, C. Rossow","doi":"10.1007/978-3-319-45719-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_8","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128110296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_15
Alejandro Calleja, J. Tapiador, Juan Caballero
{"title":"A Look into 30 Years of Malware Development from a Software Metrics Perspective","authors":"Alejandro Calleja, J. Tapiador, Juan Caballero","doi":"10.1007/978-3-319-45719-2_15","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_15","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_20
Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William K. Robertson, E. Kirda, F. Maggi, S. Zanero
{"title":"Trellis: Privilege Separation for Multi-user Applications Made Easy","authors":"Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William K. Robertson, E. Kirda, F. Maggi, S. Zanero","doi":"10.1007/978-3-319-45719-2_20","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_20","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_13
Adrian Dabrowski, G. Petzl, E. Weippl
{"title":"The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection","authors":"Adrian Dabrowski, G. Petzl, E. Weippl","doi":"10.1007/978-3-319-45719-2_13","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_13","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127411220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}