Research in Attacks, Intrusions and Defenses, 2012 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings Security and Cryptology Series
Coordonnateurs : Balzarotti Davide, Stolfo Salvatore J., Cova Marco
Virtualization.- Trusted VM Snapshots in Untrusted Cloud Infrastructures.- Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection.- Assessing the Trustworthiness of Drivers.- Attacks and Defenses.- Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat.- Memory Errors: The Past, the Present, and the Future.- A Memory Access Validation Scheme against Payload Injection Attacks.- Host and Network Security Dione:A Flexible Disk Monitoring and Analysis Framework.- AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks.- Fraud Detection and Underground Economy.- Paying for Piracy? An Analysis of One-Click Hosters’ Controversial Reward Scheme.- Proactive Discovery of Phishing Related Domain Names.- Evaluating Electricity Theft Detectors in Smart Grid Networks.- Web Security.- PoisonAmplifier:A Guided Approach of Discovering Compromised.- Websites through Reversing Search Poisoning Attacks.- DEMACRO:Defense against Malicious Cross-Domain Requests.- FlashDetect:ActionScript 3 Malware Detection.- Intrusion Detection.- ALERT-ID:Analyze Logs of the Network Element in Real Time for Intrusion Detection.- A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.- GPP-Grep:High-Speed Regular Expression Processing Engine on General Purpose Processors.- N-Gram against the Machine:On the Feasibility of the N-Gram.- Network Analysis for Binary Protocols.- Poster Abstracts.- Online Social Networks, a Criminals Multipurpose Toolbox.- The Triple-Channel Model:Toward Robust and Efficient Advanced Botnets.- Network Security Analysis Method Taking into Account the Usage Information.- Automatic Covert Channel Detection in Asbestos System.- EFA for Efficient Regular Expression Matching in NIDS.- Distress Detection.- Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System.- Towards Automated Forensic Event Reconstruction of Malicious Code.- Accurate Recovery of Functions in a Retargetable Decompiler.- Improvement of an Anagram Based NIDS by Reducing the Storage.- Space of Bloom Filters.- Concurrency Optimization for NIDS.- Malware Detection System by Payload Analysis of Network Traffic.
Fast-track conference proceedings
State-of-the-art research
Up-to-date results
Date de parution : 08-2012
Ouvrage de 402 p.
15.5x23.5 cm
Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).
Prix indicatif 52,74 €
Ajouter au panierThèmes de Research in Attacks, Intrusions and Defenses :
Mots-clés :
cloud computing; malware; memory access; network security; trust