International Symposium on Recent Advances in Intrusion Detection最新文献

筛选
英文 中文
Enabling Network Security Through Active DNS Datasets 通过主DNS数据集启用网络安全功能
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_9
Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, D. Dagon, M. Antonakakis, Rodney Joffe
{"title":"Enabling Network Security Through Active DNS Datasets","authors":"Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, D. Dagon, M. Antonakakis, Rodney Joffe","doi":"10.1007/978-3-319-45719-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_9","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges 滥用共享经济:了解威胁交换的局限性
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_7
Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, A. Berger, Elie Bursztein, Michael Bailey
{"title":"The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges","authors":"Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, A. Berger, Elie Bursztein, Michael Bailey","doi":"10.1007/978-3-319-45719-2_7","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_7","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128988706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Blender: Self-randomizing Address Space Layout for Android Apps Blender: Android应用程序的自随机地址空间布局
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_21
Mingshen Sun, John C.S. Lui, Yajin Zhou
{"title":"Blender: Self-randomizing Address Space Layout for Android Apps","authors":"Mingshen Sun, John C.S. Lui, Yajin Zhou","doi":"10.1007/978-3-319-45719-2_21","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_21","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Automatic Uncovering of Tap Points from Kernel Executions 从内核执行中自动发现Tap点
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_3
Junyuan Zeng, Yangchun Fu, Zhiqiang Lin
{"title":"Automatic Uncovering of Tap Points from Kernel Executions","authors":"Junyuan Zeng, Yangchun Fu, Zhiqiang Lin","doi":"10.1007/978-3-319-45719-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_3","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123264409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
APDU-Level Attacks in PKCS#11 Devices pkcs# 11设备中的apdu级攻击
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_5
Claudio Bozzato, R. Focardi, Francesco Palmarini, G. Steel
{"title":"APDU-Level Attacks in PKCS#11 Devices","authors":"Claudio Bozzato, R. Focardi, Francesco Palmarini, G. Steel","doi":"10.1007/978-3-319-45719-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_5","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122478503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory 驯服事务:使用事务性内存实现硬件辅助控制流完整性
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_2
Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Krügel, G. Vigna, D. Balzarotti
{"title":"Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory","authors":"Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Krügel, G. Vigna, D. Balzarotti","doi":"10.1007/978-3-319-45719-2_2","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_2","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124279151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Small Changes, Big Changes: An Updated View on the Android Permission System 小变化,大变化:Android权限系统的更新视图
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_16
Yury Zhauniarovich, O. Gadyatskaya
{"title":"Small Changes, Big Changes: An Updated View on the Android Permission System","authors":"Yury Zhauniarovich, O. Gadyatskaya","doi":"10.1007/978-3-319-45719-2_16","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_16","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis 通过动态js二进制分析对JavaScript漏洞进行语义保留剖析
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_12
Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin
{"title":"Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis","authors":"Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin","doi":"10.1007/978-3-319-45719-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_12","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132892682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service 谁会被解雇?ddos即服务的受害分析
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_17
Arman Noroozian, Maciej Korczyński, C. Gañán, Daisuke Makita, K. Yoshioka, M. V. Eeten
{"title":"Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service","authors":"Arman Noroozian, Maciej Korczyński, C. Gañán, Daisuke Makita, K. Yoshioka, M. V. Eeten","doi":"10.1007/978-3-319-45719-2_17","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_17","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
AVclass: A Tool for Massive Malware Labeling AVclass:一个大规模恶意软件标签工具
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2016-09-19 DOI: 10.1007/978-3-319-45719-2_11
Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero
{"title":"AVclass: A Tool for Massive Malware Labeling","authors":"Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero","doi":"10.1007/978-3-319-45719-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-45719-2_11","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116286218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 358
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信