The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "RAID"( http://dblp.L3S.de/Venues/RAID )

URL (DBLP): http://dblp.uni-trier.de/db/conf/raid

Publication years (Num. hits)
2000-2002 (20) 2003-2004 (31) 2005 (17) 2006 (18) 2007 (18) 2008 (37) 2009 (34) 2010 (40) 2011 (21) 2012 (31) 2013 (23) 2014 (23) 2015 (29) 2016 (22) 2017 (22) 2018 (33) 2019 (38) 2020 (32) 2021 (33) 2022 (36) 2023 (51)
Publication types (Num. hits)
inproceedings(585) proceedings(24)
Venues (Conferences, Journals, ...)
RAID(609)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 222 occurrences of 140 keywords

Results
Found 609 publication records. Showing 609 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Bin Shi, Lei Cui 0003, Bo Li 0005, Xudong Liu 0001, Zhiyu Hao, Haiying Shen ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mayana Pereira, Shaun Coleman, Bin Yu, Martine De Cock, Anderson C. A. Nascimento Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah Next Generation P2P Botnets: Monitoring Under Adverse Conditions. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert 0001 τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pierre-Antoine Vervier, Yun Shen Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonas Bushart, Christian Rossow DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jens Müller 0007, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk PostScript Undead: Pwning the Web with a 35 Years Old Language. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael D. Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (eds.) Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chen Cao, Le Guan, Ning Zhang 0017, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu 0005, Ji Xiang, Wenjing Lou CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Yunheung Paek, Michael Franz Hardware Assisted Randomization of Data. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson Malicious IoT Implants: Tampering with Serial Communication over the Internet. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Micah Bushouse, Douglas S. Reeves Furnace: Self-service Tenant VMI for the Cloud. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu 0001 Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael Brengel, Christian Rossow Identifying Key Leakage of Bitcoin Users. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Onur Sahin, Ayse K. Coskun, Manuel Egele Proteus: Detecting Android Emulators from Instruction-Level Profiles. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhi Zhang 0001, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Tongxin Li, Bin Ma 0001, Peng Wang 0088, XiaoFeng Wang 0001, Peiyuan Zong Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Henderson, Heng Yin 0001, Guang Jin, Hao Han, Hongmei Deng 0001 VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anaël Beaugnon, Pierre Chifflier, Francis R. Bach ILAB: An Interactive Labelling Strategy for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuping Li, Jiyong Jang, Xin Hu 0001, Xinming Ou Android Malware Clustering Through Malicious Payload Mining. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li 0001, William K. Robertson Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rashid Tahir, Muhammad Huzaifa, Anupam Das 0001, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar 0001, Nikita Borisov Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amin Kharraz, Engin Kirda Redemption: Real-Time Protection Against Ransomware at End-Hosts. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kevin Leach, Fengwei Zhang, Westley Weimer Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marc Dacier, Michael D. Bailey, Michalis Polychronakis, Manos Antonakakis (eds.) Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes 0001 Linking Amplification DDoS Attacks to Booter Services. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guangliang Yang 0001, Abner Mendoza, Jialong Zhang, Guofei Gu Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yue Chen, Mustakimur Khandaker, Zhi Wang 0004 Secure In-Cache Execution. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Takeshi Yada Stealth Loader: Trace-Free Program Loading for API Obfuscation. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen Practical and Accurate Runtime Application Protection Against DoS Attacks. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid 0001, Jean-Pierre Seifert, Anja Feldmann Static Program Analysis as a Fuzzing Aid. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Efthimios Alepis, Constantinos Patsakis Trapped by the UI: The Android Case. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adrian Dabrowski, Georg Petzl, Edgar R. Weippl The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen 0001, Yacin Nadji, David Dagon, Manos Antonakakis, Rodney Joffe Enabling Network Security Through Active DNS Datasets. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero AVclass: A Tool for Massive Malware Labeling. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow Uses and Abuses of Server-Side Requests. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sajjad Arshad, Amin Kharraz, William Robertson 0002 Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes 0001, Christian Rossow SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin 0001 Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tianwei Zhang 0004, Yinqian Zhang, Ruby B. Lee CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yury Zhauniarovich, Olga Gadyatskaya Small Changes, Big Changes: An Updated View on the Android Permission System. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alejandro Calleja, Juan E. Tapiador, Juan Caballero A Look into 30 Years of Malware Development from a Software Metrics Perspective. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener A Formal Framework for Environmentally Sensitive Malware. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Junyuan Zeng, Yangchun Fu, Zhiqiang Lin Automatic Uncovering of Tap Points from Kernel Executions. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson 0002, Engin Kirda, Federico Maggi, Stefano Zanero Trellis: Privilege Separation for Multi-user Applications Made Easy. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis GRIM: Leveraging GPUs for Kernel Integrity Monitoring. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel APDU-Level Attacks in PKCS#11 Devices. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang 0002, Guofei Jiang Detecting Stack Layout Corruptions with Robust Stack Unwinding. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mingshen Sun, John C. S. Lui, Yajin Zhou Blender: Self-randomizing Address Space Layout for Android Apps. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquín García-Alfaro (eds.) Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder A Formal Framework for Program Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Johanna Ullrich, Edgar R. Weippl Privacy is Not an Option: Attacking the IPv6 Privacy Extension. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pinghai Yuan, Qingkai Zeng 0002, Xuhua Ding Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meining Nie, Purui Su, Qi Li 0002, Zhi Wang 0004, Lingyun Ying, Jinlong Hu, Dengguo Feng Xede: Practical Exploit Early Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla BotWatcher - Transparent and Generic Botnet Tracking. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Johanna Amann, Robin Sommer Providing Dynamic Control to Passive Network Security Monitoring. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Röpke 0001, Thorsten Holz SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yang Zhang 0021, Xiaoshan Sun, Yi Deng 0002, Liang Cheng 0004, Shuke Zeng, Yu Fu, Dengguo Feng Improving Accuracy of Static Integer Overflow Detection in Binary. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis WYSISNWIV: What You Scan Is Not What I Visit. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wenbo Yang, Yuanyuan Zhang 0002, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas Kittel 0001, Sebastian Vogl, Julian Kirsch, Claudia Eckert 0001 Counteracting Data-Only Malware with Code Pointer Examination. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Haitao Xu 0002, Haining Wang, Angelos Stavrou Privacy Risk Assessment on Online Photos. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Herbert Bos, Fabian Monrose, Gregory Blanc (eds.) Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann 0001, Olivier Heen, Aurélien Francillon Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dario Weißer, Johannes Dahse, Thorsten Holz Security Analysis of PHP Bytecode Protection Mechanisms. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst W. Biersack Demystifying the IP Blackspace. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junyuan Zeng, Zhiqiang Lin Towards Automatic Inference of Kernel Object Semantics from Binary Code. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Charles Smutz, Angelos Stavrou Preventing Exploits in Microsoft Office Documents Through Content Randomization. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicoló Andronio, Stefano Zanero, Federico Maggi HelDroid: Dissecting and Detecting Mobile Ransomware. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang 0001, Stefan Berger, Dimitrios E. Pendarakis Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev Ensemble Learning for Low-Level Hardware-Supported Malware Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryan M. Gerdes, Saptarshi Mallick Physical-Layer Detection of Hardware Keyloggers. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marc Kührer, Christian Rossow, Thorsten Holz Paint It Black: Evaluating the Effectiveness of Malware Blacklists. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo Synthetic Data Generation and Defense in Depth Measurement of Web Applications. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz Evaluating the Effectiveness of Current Anti-ROP Defenses. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis Dynamic Reconstruction of Relocation Information for Stripped Binaries. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 609 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license