Research in Attacks, Intrusions, and Defenses : 15th International Symposium, RAID 2012, Amsterdam, the Netherlands, September 12-14, 2012. Proceedings /
Research in Attacks, Intrusions, and Defenses : 15th International Symposium, RAID 2012, Amsterdam, the Netherlands, September 12-14, 2012. Proceedings /
RAID 2012
Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.).
- Berlin ; New York : Springer, ©2012.
- 1 online resource
- Lecture notes in computer science, 7462 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology .
- Lecture notes in computer science ; 7462. LNCS sublibrary. SL 4, Security and cryptology. .
International conference proceedings.
Includes bibliographical references and author index.
Trusted VM Snapshots in Untrusted Cloud Infrastructures / Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection / Assessing the Trustworthiness of Drivers / Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat / Memory Errors: The Past, the Present, and the Future / A Memory Access Validation Scheme against Payload Injection Attacks / Dione: A Flexible Disk Monitoring and Analysis Framework / AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks / Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes / Abhinav Srivastava, Himanshu Raj, Jonathon Giffin and Paul England -- Martim Carbone, Matthew Conover, Bruce Montague and Wenke Lee -- Shengzhi Zhang and Peng Liu -- Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan and Martin Lee -- Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro and Herbert Bos -- Dongkyun Ahn and Gyungho Lee -- Jennifer Mankin and David Kaeli -- Zhi Xu, Hungyuan Hsu, Xin Chen, Sencun Zhu and Ali R. Hurson -- Tobias Lauinger, Engin Kirda and Pietro Michiardi. Proactive Discovery of Phishing Related Domain Names / Evaluating Electricity Theft Detectors in Smart Grid Networks / PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks / DEMACRO: Defense against Malicious Cross-Domain Requests / FlashDetect: ActionScript 3 Malware Detection / ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection / A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence / GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors / Samuel Marchal, Jérôme François, Radu State and Thomas Engel -- Daisuke Mashima and Alvaro A. Cárdenas -- Jialong Zhang, Chao Yang, Zhaoyan Xu and Guofei Gu -- Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens and Martin Johns -- Timon Van Overveldt, Christopher Kruegel and Giovanni Vigna -- Jie Chu, Zihui Ge, Richard Huber, Ping Ji and Jennifer Yates, et al. -- Bernhard Amann, Robin Sommer, Aashish Sharma and Seth Hall -- Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish and Min Sik Kim, et al. N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols / Online Social Networks, a Criminals Multipurpose Toolbox The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets Network Security Analysis Method Taking into Account the Usage Information Automatic Covert Channel Detection in Asbestos System EFA for Efficient Regular Expression Matching in NIDS Distress Detection Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System Dina Hadžiosmanović, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon and Sandro Etalle -- Shah Mahmood and Yvo Desmedt -- Cui Xiang, Shi Jinqiao, Liao Peng and Liu Chaoge -- Wu Jinyu, Yin Lihua and Fang Binxing -- Shuyuan Jin, Zhi Yang and Xiang Cui -- Dengke Qiao, Tingwen Liu, Yong Sun and Li Guo -- Mark Vella, Sotirios Terzis and Marc Roper -- Jenny Andrea Pinto Sánchez and Luis Javier García Villalba. (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / Towards Automated Forensic Event Reconstruction of Malicious Code Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract) / Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters Concurrency Optimization for NIDS Malware Detection System by Payload Analysis of Network Traffic Ahmed F. Shosha, Joshua I. James, Chen-Ching Liu and Pavel Gladyshev -- Lukáš Ďurfina, Jakub Křoustek, Petr Zemek and Břetislav Kábele -- Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Luis Javier García Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco and Javier Martínez Puentes. (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) /
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
English.
9783642333385 3642333389 3642333370 9783642333378
10.1007/978-3-642-33338-5 doi
Springer
016175110 Uk
Computer networks--Security measures--Congresses.
Computer networks--Access control--Congresses.
Computer security--Congresses.
Réseaux d'ordinateurs--Sécurité--Mesures--Congrès.
Sécurité informatique--Congrès.
Informatique.
Computer networks--Access control
Computer networks--Security measures
Computer security
Computer science. Computer Communication Networks. Operating systems (Computers) Data protection. Systems and Data Security. Operating Systems. Programming Languages, Compilers, Interpreters. e-Commerce/e-business. Information Systems Applications (incl. Internet) computerwetenschappen computer sciences informatiesystemen information systems internet elektronische handel electronic commerce programmeertalen programming languages gegevensbeheer data management computernetwerken computer networks Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
TK5105.59 / .R35 2012
005.8
International conference proceedings.
Includes bibliographical references and author index.
Trusted VM Snapshots in Untrusted Cloud Infrastructures / Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection / Assessing the Trustworthiness of Drivers / Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat / Memory Errors: The Past, the Present, and the Future / A Memory Access Validation Scheme against Payload Injection Attacks / Dione: A Flexible Disk Monitoring and Analysis Framework / AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks / Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes / Abhinav Srivastava, Himanshu Raj, Jonathon Giffin and Paul England -- Martim Carbone, Matthew Conover, Bruce Montague and Wenke Lee -- Shengzhi Zhang and Peng Liu -- Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan and Martin Lee -- Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro and Herbert Bos -- Dongkyun Ahn and Gyungho Lee -- Jennifer Mankin and David Kaeli -- Zhi Xu, Hungyuan Hsu, Xin Chen, Sencun Zhu and Ali R. Hurson -- Tobias Lauinger, Engin Kirda and Pietro Michiardi. Proactive Discovery of Phishing Related Domain Names / Evaluating Electricity Theft Detectors in Smart Grid Networks / PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks / DEMACRO: Defense against Malicious Cross-Domain Requests / FlashDetect: ActionScript 3 Malware Detection / ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection / A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence / GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors / Samuel Marchal, Jérôme François, Radu State and Thomas Engel -- Daisuke Mashima and Alvaro A. Cárdenas -- Jialong Zhang, Chao Yang, Zhaoyan Xu and Guofei Gu -- Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens and Martin Johns -- Timon Van Overveldt, Christopher Kruegel and Giovanni Vigna -- Jie Chu, Zihui Ge, Richard Huber, Ping Ji and Jennifer Yates, et al. -- Bernhard Amann, Robin Sommer, Aashish Sharma and Seth Hall -- Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish and Min Sik Kim, et al. N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols / Online Social Networks, a Criminals Multipurpose Toolbox The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets Network Security Analysis Method Taking into Account the Usage Information Automatic Covert Channel Detection in Asbestos System EFA for Efficient Regular Expression Matching in NIDS Distress Detection Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System Dina Hadžiosmanović, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon and Sandro Etalle -- Shah Mahmood and Yvo Desmedt -- Cui Xiang, Shi Jinqiao, Liao Peng and Liu Chaoge -- Wu Jinyu, Yin Lihua and Fang Binxing -- Shuyuan Jin, Zhi Yang and Xiang Cui -- Dengke Qiao, Tingwen Liu, Yong Sun and Li Guo -- Mark Vella, Sotirios Terzis and Marc Roper -- Jenny Andrea Pinto Sánchez and Luis Javier García Villalba. (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / Towards Automated Forensic Event Reconstruction of Malicious Code Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract) / Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters Concurrency Optimization for NIDS Malware Detection System by Payload Analysis of Network Traffic Ahmed F. Shosha, Joshua I. James, Chen-Ching Liu and Pavel Gladyshev -- Lukáš Ďurfina, Jakub Křoustek, Petr Zemek and Břetislav Kábele -- Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Luis Javier García Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco and Javier Martínez Puentes. (Poster Abstract) / (Poster Abstract) / (Poster Abstract) / (Poster Abstract) /
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
English.
9783642333385 3642333389 3642333370 9783642333378
10.1007/978-3-642-33338-5 doi
Springer
016175110 Uk
Computer networks--Security measures--Congresses.
Computer networks--Access control--Congresses.
Computer security--Congresses.
Réseaux d'ordinateurs--Sécurité--Mesures--Congrès.
Sécurité informatique--Congrès.
Informatique.
Computer networks--Access control
Computer networks--Security measures
Computer security
Computer science. Computer Communication Networks. Operating systems (Computers) Data protection. Systems and Data Security. Operating Systems. Programming Languages, Compilers, Interpreters. e-Commerce/e-business. Information Systems Applications (incl. Internet) computerwetenschappen computer sciences informatiesystemen information systems internet elektronische handel electronic commerce programmeertalen programming languages gegevensbeheer data management computernetwerken computer networks Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
TK5105.59 / .R35 2012
005.8