{"title":"RWGuard: A Real-Time Detection System Against Cryptographic Ransomware","authors":"Shagufta Mehnaz, Anand Mudgerikar, E. Bertino","doi":"10.1007/978-3-030-00470-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_6","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pastrana, Alice Hutchings, Andrew Caines, P. Buttery
{"title":"Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum","authors":"S. Pastrana, Alice Hutchings, Andrew Caines, P. Buttery","doi":"10.1007/978-3-030-00470-5_10","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_10","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115310651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape","authors":"Pierre-Antoine Vervier, Yun Shen","doi":"10.1007/978-3-030-00470-5_26","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_26","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GuidedPass: Helping Users to Create Strong and Memorable Passwords","authors":"Simon S. Woo, J. Mirkovic","doi":"10.1007/978-3-030-00470-5_12","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_12","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Furnace: Self-service Tenant VMI for the Cloud","authors":"Micah Bushouse, D. Reeves","doi":"10.1007/978-3-030-00470-5_30","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_30","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backdoors: Definition, Deniability and Detection","authors":"Sam L. Thomas, Aurélien Francillon","doi":"10.1007/978-3-030-00470-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_5","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Y. Paek, M. Franz
{"title":"Hardware Assisted Randomization of Data","authors":"B. Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Y. Paek, M. Franz","doi":"10.1007/978-3-030-00470-5_16","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_16","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122040519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation","authors":"Lucian Mogosanu, A. Rane, Nathan Dautenhahn","doi":"10.1007/978-3-030-00470-5_17","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_17","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116189996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proteus: Detecting Android Emulators from Instruction-Level Profiles","authors":"O. Sahin, A. Coskun, Manuel Egele","doi":"10.1007/978-3-030-00470-5_1","DOIUrl":"https://doi.org/10.1007/978-3-030-00470-5_1","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}