Research in attacks, intrusions, and defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings /: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- Research in attacks, intrusions, and defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings /: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings. (2017)
- Main Title:
- Research in attacks, intrusions, and defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings
- Other Titles:
- RAID 2017
- Further Information:
- Note: Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis (eds.).
- Editors:
- Dacier, Marc
Bailey, Michael
(Computer scientist), Polychronakis, Michalis
Antonakakis, Manos - Other Names:
- RAID (Symposium), 20th
- Contents:
- VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of maliciousVDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xiii, 496 pages), illustrations
- Subjects:
- 005.7
Computer science
Intrusion detection systems (Computer security) -- Congresses
Intrusion detection systems (Computer security)
Computers -- Security -- General
Business & Economics -- Information Management
Computers -- Hardware -- Network Hardware
Computers -- Operating Systems -- General
Computer security
Coding theory & cryptology
Information architecture
Network hardware
Operating systems
Computer security
Data protection
Data encryption (Computer science)
Information Systems
Computer Communication Networks
Operating systems (Computers)
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319663326
3319663321
3319663313
9783319663319 - Related ISBNs:
- 9783319663319
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed October 23, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.366375
- Ingest File:
- 01_343.xml