Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_9
Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, D. Dagon, M. Antonakakis, Rodney Joffe
{"title":"Enabling Network Security Through Active DNS Datasets","authors":"Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, D. Dagon, M. Antonakakis, Rodney Joffe","doi":"10.1007/978-3-319-45719-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_9","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_7
Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, A. Berger, Elie Bursztein, Michael Bailey
{"title":"The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges","authors":"Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, A. Berger, Elie Bursztein, Michael Bailey","doi":"10.1007/978-3-319-45719-2_7","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_7","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128988706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_21
Mingshen Sun, John C.S. Lui, Yajin Zhou
{"title":"Blender: Self-randomizing Address Space Layout for Android Apps","authors":"Mingshen Sun, John C.S. Lui, Yajin Zhou","doi":"10.1007/978-3-319-45719-2_21","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_21","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_3
Junyuan Zeng, Yangchun Fu, Zhiqiang Lin
{"title":"Automatic Uncovering of Tap Points from Kernel Executions","authors":"Junyuan Zeng, Yangchun Fu, Zhiqiang Lin","doi":"10.1007/978-3-319-45719-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_3","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123264409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_5
Claudio Bozzato, R. Focardi, Francesco Palmarini, G. Steel
{"title":"APDU-Level Attacks in PKCS#11 Devices","authors":"Claudio Bozzato, R. Focardi, Francesco Palmarini, G. Steel","doi":"10.1007/978-3-319-45719-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_5","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122478503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_2
Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Krügel, G. Vigna, D. Balzarotti
{"title":"Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory","authors":"Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Krügel, G. Vigna, D. Balzarotti","doi":"10.1007/978-3-319-45719-2_2","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_2","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124279151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_16
Yury Zhauniarovich, O. Gadyatskaya
{"title":"Small Changes, Big Changes: An Updated View on the Android Permission System","authors":"Yury Zhauniarovich, O. Gadyatskaya","doi":"10.1007/978-3-319-45719-2_16","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_16","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_17
Arman Noroozian, Maciej Korczyński, C. Gañán, Daisuke Makita, K. Yoshioka, M. V. Eeten
{"title":"Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service","authors":"Arman Noroozian, Maciej Korczyński, C. Gañán, Daisuke Makita, K. Yoshioka, M. V. Eeten","doi":"10.1007/978-3-319-45719-2_17","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_17","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-19DOI: 10.1007/978-3-319-45719-2_11
Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero
{"title":"AVclass: A Tool for Massive Malware Labeling","authors":"Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero","doi":"10.1007/978-3-319-45719-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_11","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116286218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}