Description |
1 online resource (xi, 475 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 8145 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8145. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Hardware-Level Security. A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory / Patrick Stewin -- Hypervisor Memory Forensics / Mariano Graziano, Andrea Lanzi, Davide Balzarotti -- Server-Level and OS-Level Security. Server-Side Code Injection Attacks: A Historical Perspective / Jakob Fritz, Corrado Leita, Michalis Polychronakis -- Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets / Blaine Stancill [and others] -- Systematic Analysis of Defenses against Return-Oriented Programming / Richard Skowyra [and others] -- SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel / Xi Xiong, Peng Liu -- Malware. API Chaser: Anti-analysis Resistant Malware Analyzer / Yuhei Kawakoya [and others] -- FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors / M. Zubair Rafique, Juan Caballero -- Deobfuscating Embedded Malware Using Probable-Plaintext Attacks / Christian Wressnegger, Frank Boldewin, Konrad Rieck -- Detecting Traditional Packers, Decisively / Denis Bueno [and others] -- Authentication and Credential Attacks. Side-Channel Attacks on the Yubikey 2 One-Time Password Generator / David Oswald, Bastian Richter, Christof Paar -- Active Credential Leakage for Observing Web-Based Attack Cycle / Mitsuaki Akiyama [and others] -- Web and Network Privacy and Security. Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications / Bin Zhao, Peng Liu -- Tamper-Resistant LikeJacking Protection / Martin Johns, Sebastian Lekies -- Deconstructing the Assessment of Anomaly-based Intrusion Detectors / Arun Viswanathan, Kymie Tan, Clifford Neuman -- Mobile Security. Practical Context-Aware Permission Control for Hybrid Mobile Applications / Kapil Singh -- Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses / Nan Jiang [and others] -- Mobile Malware Detection Based on Energy Fingerprints -- A Dead End? / Johannes Hoffmann, Stephan Neumann, Thorsten Holz -- Cloud and Anonymity Networks I. Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters / Tobias Lauinger [and others] -- Connected Colors: Unveiling the Structure of Criminal Networks / Yacin Nadji [and others] -- Cloud and Anonymity Networks II. CloudFence: Data Flow Tracking as a Cloud Service / Vasilis Pappas [and others] -- Practical Attacks against the I2P Network / Christoph Egger [and others] |
Summary |
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy |
Analysis |
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
information systems |
|
internet |
|
elektronische handel |
|
electronic commerce |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and index |
Subject |
Intrusion detection systems (Computer security) -- Congresses
|
|
Computer security.
|
|
Civil defense.
|
|
Computer Security
|
|
Civil Defense
|
|
Computer security
|
|
Civil defense
|
|
Intrusion detection systems (Computer security)
|
|
Engineering & Applied Sciences.
|
|
Computer Science.
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Stolfo, Salvatore J. (Salvatore Joseph), editor.
|
|
Stavrou, Angelos, editor
|
|
Wright, Charles V., editor
|
ISBN |
9783642412844 |
|
364241284X |
|