Skip to main content
  • Conference proceedings
  • © 2013

Research in Attacks, Intrusions, and Defenses

16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings

  • Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2013

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8145)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Hardware-Level Security

    1. Hypervisor Memory Forensics

      • Mariano Graziano, Andrea Lanzi, Davide Balzarotti
      Pages 21-40
  3. Server-Level and OS-Level Security

    1. Server-Side Code Injection Attacks: A Historical Perspective

      • Jakob Fritz, Corrado Leita, Michalis Polychronakis
      Pages 41-61
    2. Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets

      • Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi
      Pages 62-81
    3. Systematic Analysis of Defenses against Return-Oriented Programming

      • Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William Streilein
      Pages 82-102
  4. Malware

    1. API Chaser: Anti-analysis Resistant Malware Analyzer

      • Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu
      Pages 123-143
    2. Deobfuscating Embedded Malware Using Probable-Plaintext Attacks

      • Christian Wressnegger, Frank Boldewin, Konrad Rieck
      Pages 164-183
    3. Detecting Traditional Packers, Decisively

      • Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael Bailey
      Pages 184-203
  5. Authentication and Credential Attacks

    1. Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

      • David Oswald, Bastian Richter, Christof Paar
      Pages 204-222
    2. Active Credential Leakage for Observing Web-Based Attack Cycle

      • Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi
      Pages 223-243
  6. Web and Network Privacy and Security

    1. Tamper-Resistant LikeJacking Protection

      • Martin Johns, Sebastian Lekies
      Pages 265-285
    2. Deconstructing the Assessment of Anomaly-based Intrusion Detectors

      • Arun Viswanathan, Kymie Tan, Clifford Neuman
      Pages 286-306
  7. Mobile Security

    1. Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses

      • Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang
      Pages 328-347
    2. Mobile Malware Detection Based on Energy Fingerprints — A Dead End?

      • Johannes Hoffmann, Stephan Neumann, Thorsten Holz
      Pages 348-368
  8. Cloud and Anonymity Networks I

    1. Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters

      • Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, Engin Kirda, William Robertson, Mohamed Ali Kaafar
      Pages 369-389

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

About this book

This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.

Editors and Affiliations

  • Department of Computer Science, Columbia University, USA

    Salvatore J. Stolfo

  • Department of Computer Science, George Mason University, Fairfax, USA

    Angelos Stavrou

  • Department of Computer Science, Portland State University, Portland, USA

    Charles V. Wright

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access