International Symposium on Recent Advances in Intrusion Detection最新文献

筛选
英文 中文
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries x86-64二进制文件的类型辅助控制流完整性
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_20
Paul Muntean, M. Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, C. Eckert
{"title":"τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries","authors":"Paul Muntean, M. Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, C. Eckert","doi":"10.1007/978-3-030-00470-5_20","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_20","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Next Generation P2P Botnets: Monitoring Under Adverse Conditions 下一代P2P僵尸网络:不利条件下的监控
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_24
Leon Böck, Emmanouil Vasilomanolakis, M. Mühlhäuser, Shankar Karuppayah
{"title":"Next Generation P2P Botnets: Monitoring Under Adverse Conditions","authors":"Leon Böck, Emmanouil Vasilomanolakis, M. Mühlhäuser, Shankar Karuppayah","doi":"10.1007/978-3-030-00470-5_24","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_24","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122996362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic 被动DNS流量中算法生成域名的字典提取与检测
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_14
Mayana Pereira, S. Coleman, Bin Yu, M. D. Cock, A. Nascimento
{"title":"Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic","authors":"Mayana Pereira, S. Coleman, Bin Yu, M. D. Cock, A. Nascimento","doi":"10.1007/978-3-030-00470-5_14","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_14","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances 基于最近邻距离的关键基础设施网络流量统计相似度研究
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_27
Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim
{"title":"Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances","authors":"Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim","doi":"10.1007/978-3-030-00470-5_27","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_27","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data 保护Java应用程序免受不可信数据反序列化的可信执行路径
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_21
S. Cristalli, Edoardo Vignati, D. Bruschi, A. Lanzi
{"title":"Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data","authors":"S. Cristalli, Edoardo Vignati, D. Bruschi, A. Lanzi","doi":"10.1007/978-3-030-00470-5_21","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_21","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identifying Key Leakage of Bitcoin Users 识别比特币用户的密钥泄露
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_29
Michael Brengel, C. Rossow
{"title":"Identifying Key Leakage of Bitcoin Users","authors":"Michael Brengel, C. Rossow","doi":"10.1007/978-3-030-00470-5_29","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_29","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Malicious IoT Implants: Tampering with Serial Communication over the Internet 恶意物联网植入物:篡改互联网上的串行通信
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_25
Philipp Morgner, Stefan Pfennig, Dennis Salzner, Z. Benenson
{"title":"Malicious IoT Implants: Tampering with Serial Communication over the Internet","authors":"Philipp Morgner, Stefan Pfennig, Dennis Salzner, Z. Benenson","doi":"10.1007/978-3-030-00470-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_25","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails 阅读字里行间:鱼叉式网络钓鱼邮件的内容不可知论检测
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_4
Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck
{"title":"Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails","authors":"Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck","doi":"10.1007/978-3-030-00470-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_4","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122200707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence 错误传感器:从HTTP错误流量中挖掘恶意软件情报信息
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_22
Jialong Zhang, Jiyong Jang, G. Gu, M. Stoecklin, Xin Hu
{"title":"Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence","authors":"Jialong Zhang, Jiyong Jang, G. Gu, M. Stoecklin, Xin Hu","doi":"10.1007/978-3-030-00470-5_22","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_22","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer 击败针对Rowhammer的软件缓解措施:外科手术式精密锤
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-00470-5_3
Andrei Tatar, Cristiano Giuffrida, H. Bos, Kaveh Razavi
{"title":"Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer","authors":"Andrei Tatar, Cristiano Giuffrida, H. Bos, Kaveh Razavi","doi":"10.1007/978-3-030-00470-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_3","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131856567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信