Skip to main content
  • Conference proceedings
  • © 2017

Research in Attacks, Intrusions, and Defenses

20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10453)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

    Pages I-XIII
  2. Software Security

    1. Front Matter

      Pages 1-1
    2. VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices

      • Andrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng
      Pages 3-25
    3. Static Program Analysis as a Fuzzing Aid

      • Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck et al.
      Pages 26-47
    4. Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit

      • Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi et al.
      Pages 48-69
  3. Intrusion Detection

    1. Front Matter

      Pages 71-71
    2. Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis

      • Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li, William Robertson
      Pages 73-97
    3. ILAB: An Interactive Labelling Strategy for Intrusion Detection

      • Anaël Beaugnon, Pierre Chifflier, Francis Bach
      Pages 120-140
  4. Android Security

    1. Front Matter

      Pages 141-141
    2. Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps

      • Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu
      Pages 143-166
    3. Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level

      • Kai Chen, Tongxin Li, Bin Ma, Peng Wang, XiaoFeng Wang, Peiyuan Zong
      Pages 167-191
    4. Android Malware Clustering Through Malicious Payload Mining

      • Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou
      Pages 192-214
  5. Systems Security

    1. Front Matter

      Pages 215-215
    2. Stealth Loader: Trace-Free Program Loading for API Obfuscation

      • Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Takeshi Yada
      Pages 217-237
    3. LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization

      • David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi
      Pages 238-258
    4. CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers

      • Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan
      Pages 259-284
  6. Cybercrime

    1. Front Matter

      Pages 285-285
    2. Mining on Someone Else’s Dime: Mitigating Covert Mining Operations in Clouds and Enterprises

      • Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl Gunter, Fareed Zaffar et al.
      Pages 287-310
    3. BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems

      • Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy
      Pages 311-333

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

About this book

This book constitutes the refereed conference proceedings of the 20th  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017.

The 21 revised full papers were selected from 105 submissions. They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.

Editors and Affiliations

  • Qatar Computing Research Institute, Doha, Qatar

    Marc Dacier

  • University of Illinois at Urbana Champaign, Champaign, USA

    Michael Bailey

  • Stony Brook University, Stony Brook, USA

    Michalis Polychronakis

  • Georgia Institute of Technology, Georgia, USA

    Manos Antonakakis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access