Skip to main content
  • Conference proceedings
  • © 2014

Research in Attacks, Intrusions and Defenses

17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8688)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Malware and Defenses

    1. Paint It Black: Evaluating the Effectiveness of Malware Blacklists

      • Marc Kührer, Christian Rossow, Thorsten Holz
      Pages 1-21
    2. GoldenEye: Efficiently and Effectively Unveiling Malware’s Targeted Environment

      • Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin
      Pages 22-45
    3. PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging

      • Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
      Pages 46-67
  3. Malware and Binary Analysis

    1. Dynamic Reconstruction of Relocation Information for Stripped Binaries

      • Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
      Pages 68-87
    2. Evaluating the Effectiveness of Current Anti-ROP Defenses

      • Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag et al.
      Pages 88-108
    3. Unsupervised Anomaly-Based Malware Detection Using Hardware Features

      • Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo
      Pages 109-129
  4. Web

    1. Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection

      • Jacopo Corbetta, Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
      Pages 130-149
    2. You Can’t Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers

      • Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang
      Pages 150-171
    3. Measuring Drive-by Download Defense in Depth

      • Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo
      Pages 172-191
  5. Web II

    1. Why Is CSP Failing? Trends and Challenges in CSP Adoption

      • Michael Weissbacher, Tobias Lauinger, William Robertson
      Pages 212-233
    2. Synthetic Data Generation and Defense in Depth Measurement of Web Applications

      • Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo
      Pages 234-254
  6. Authentication and Privacy

    1. A Comparative Evaluation of Implicit Authentication Schemes

      • Hassan Khan, Aaron Atwater, Urs Hengartner
      Pages 255-275
    2. Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel

      • Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Kruegel, Giovanni Vigna, Yan Chen
      Pages 276-298
    3. Wait a Minute! A fast, Cross-VM Attack on AES

      • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
      Pages 299-319
  7. Network Security

    1. Formal Analysis of Security Procedures in LTE - A Feasibility Study

      • Noomene Ben Henda, Karl Norrman
      Pages 341-361
    2. Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks

      • Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim
      Pages 362-383
  8. Intrusion Detection and Vulnerability Analysis

    1. On Emulation-Based Network Intrusion Detection Systems

      • Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle
      Pages 384-404

Other Volumes

  1. Research in Attacks, Intrusions and Defenses

About this book

This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.

Editors and Affiliations

  • George Mason University, Fairfax, USA

    Angelos Stavrou

  • VU University Amsterdam, The Netherlands

    Herbert Bos

  • Stevens Institute of Technology, USA

    Georgios Portokalidis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access