Paul Muntean, M. Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, C. Eckert
{"title":"τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries","authors":"Paul Muntean, M. Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, C. Eckert","doi":"10.1007/978-3-030-00470-5_20","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_20","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mayana Pereira, S. Coleman, Bin Yu, M. D. Cock, A. Nascimento
{"title":"Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic","authors":"Mayana Pereira, S. Coleman, Bin Yu, M. D. Cock, A. Nascimento","doi":"10.1007/978-3-030-00470-5_14","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_14","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Cristalli, Edoardo Vignati, D. Bruschi, A. Lanzi
{"title":"Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data","authors":"S. Cristalli, Edoardo Vignati, D. Bruschi, A. Lanzi","doi":"10.1007/978-3-030-00470-5_21","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_21","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Key Leakage of Bitcoin Users","authors":"Michael Brengel, C. Rossow","doi":"10.1007/978-3-030-00470-5_29","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_29","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Philipp Morgner, Stefan Pfennig, Dennis Salzner, Z. Benenson
{"title":"Malicious IoT Implants: Tampering with Serial Communication over the Internet","authors":"Philipp Morgner, Stefan Pfennig, Dennis Salzner, Z. Benenson","doi":"10.1007/978-3-030-00470-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_25","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck
{"title":"Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails","authors":"Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck","doi":"10.1007/978-3-030-00470-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_4","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122200707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jialong Zhang, Jiyong Jang, G. Gu, M. Stoecklin, Xin Hu
{"title":"Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence","authors":"Jialong Zhang, Jiyong Jang, G. Gu, M. Stoecklin, Xin Hu","doi":"10.1007/978-3-030-00470-5_22","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_22","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrei Tatar, Cristiano Giuffrida, H. Bos, Kaveh Razavi
{"title":"Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer","authors":"Andrei Tatar, Cristiano Giuffrida, H. Bos, Kaveh Razavi","doi":"10.1007/978-3-030-00470-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_3","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131856567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}