Skip to main content
  • Conference proceedings
  • © 2016

Research in Attacks, Intrusions, and Defenses

19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9854)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

    Pages I-XIII
  2. Systems Security

    1. Front Matter

      Pages 1-1
    2. GRIM: Leveraging GPUs for Kernel Integrity Monitoring

      • Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis
      Pages 3-23
    3. Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory

      • Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti
      Pages 24-48
    4. Automatic Uncovering of Tap Points from Kernel Executions

      • Junyuan Zeng, Yangchun Fu, Zhiqiang Lin
      Pages 49-70
    5. Detecting Stack Layout Corruptions with Robust Stack Unwinding

      • Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
      Pages 71-94
  3. Low-Level Attacks and Defenses

    1. Front Matter

      Pages 95-95
    2. APDU-Level Attacks in PKCS#11 Devices

      • Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel
      Pages 97-117
    3. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds

      • Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
      Pages 118-140
  4. Measurement Studies

    1. Front Matter

      Pages 141-141
    2. The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

      • Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger et al.
      Pages 143-164
    3. SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion

      • Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto et al.
      Pages 165-187
    4. Enabling Network Security Through Active DNS Datasets

      • Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon et al.
      Pages 188-208
  5. Malware Analysis

    1. Front Matter

      Pages 209-209
    2. A Formal Framework for Environmentally Sensitive Malware

      • Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener
      Pages 211-229
    3. AVclass: A Tool for Massive Malware Labeling

      • Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero
      Pages 230-253
    4. Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis

      • Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin
      Pages 254-276
  6. Network Security

    1. Front Matter

      Pages 277-277
    2. The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection

      • Adrian Dabrowski, Georg Petzl, Edgar R. Weippl
      Pages 279-302
    3. On the Feasibility of TTL-Based Filtering for DRDoS Mitigation

      • Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
      Pages 303-322

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

About this book

This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016.

The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security.

Editors and Affiliations

  • University of North Carolina at Chapel H , Chapel-Hill, USA

    Fabian Monrose

  • Qatar Computing Research Institute , Doha, Qatar

    Marc Dacier

  • Université Paris-Saclay , Evry, France

    Gregory Blanc

  • TELECOM SudParis , EVRY, France

    Joaquin Garcia-Alfaro

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access