Skip to main content
  • Conference proceedings
  • © 2018

Research in Attacks, Intrusions, and Defenses

21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11050)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2018.

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

    Pages I-XIV
  2. Attacks

    1. Front Matter

      Pages 1-1
    2. Proteus: Detecting Android Emulators from Instruction-Level Profiles

      • Onur Sahin, Ayse K. Coskun, Manuel Egele
      Pages 3-24
    3. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

      • Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder
      Pages 25-46
    4. Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer

      • Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
      Pages 47-66
  3. Intrusion Detection and Prevention

    1. Front Matter

      Pages 67-67
    2. Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails

      • Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck
      Pages 69-91
    3. Backdoors: Definition, Deniability and Detection

      • Sam L. Thomas, Aurélien Francillon
      Pages 92-113
    4. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware

      • Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino
      Pages 114-136
  4. DDoS Attacks

    1. Front Matter

      Pages 137-137
    2. DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives

      • Jonas Bushart, Christian Rossow
      Pages 139-160Open Access
    3. Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures

      • Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai
      Pages 161-183
    4. Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids

      • Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar Weippl
      Pages 184-203
  5. Passwords, Accounts, and Users

    1. Front Matter

      Pages 205-205
    2. Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum

      • Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery
      Pages 207-227
    3. SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels

      • Binghui Wang, Le Zhang, Neil Zhenqiang Gong
      Pages 228-249
    4. GuidedPass: Helping Users to Create Strong and Memorable Passwords

      • Simon S. Woo, Jelena Mirkovic
      Pages 250-270
  6. Machine Learning for Computer Security

    1. Front Matter

      Pages 271-271
    2. Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks

      • Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg
      Pages 273-294
    3. Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic

      • Mayana Pereira, Shaun Coleman, Bin Yu, Martine DeCock, Anderson Nascimento
      Pages 295-314

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

About this book

This book constitutes the refereed proceedings of the 21st  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.

The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.



Editors and Affiliations

  • University of Illinois at Urbana-Champaign, Urbana, USA

    Michael Bailey

  • Ruhr-Universität Bochum, Bochum, Germany

    Thorsten Holz

  • Vrije Universiteit Amsterdam, Amsterdam, The Netherlands

    Manolis Stamatogiannakis

  • Foundation for Research & Technology – Hellas, Heraklion, Crete, Greece

    Sotiris Ioannidis

Bibliographic Information

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access