Sciweavers

RAID
2015
Springer
8 years 3 months ago
Counteracting Data-Only Malware with Code Pointer Examination
As new code-based defense technologies emerge, attackers move to data-only malware, which is capable of infecting a system without introducing any new code. To manipulate the contr...
Thomas Kittel, Sebastian Vogl, Julian Kirsch, Clau...
RAID
2015
Springer
8 years 3 months ago
WYSISNWIV: What You Scan Is Not What I Visit
Abstract. A variety of attacks, including remote-code execution exploits, malware, and phishing, are delivered to users over the web. Users are lured to malicious websites in vario...
Qilang Yang, Dimitrios Damopoulos, Georgios Portok...
RAID
2015
Springer
8 years 3 months ago
Demystifying the IP Blackspace
A small part of the IPv4 address space has still not been assigned for use to any organization. However, some of this IP space is announced through BGP, and is, therefore, globally...
Quentin Jacquemart, Pierre-Antoine Vervier, Guilla...
RAID
2015
Springer
8 years 3 months ago
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
Cache attacks, which exploit differences in timing to perform covert or side channels, are now well understood. Recent works leverage the last level cache to perform cache attacks...
Clémentine Maurice, Nicolas Le Scouarnec, C...
RAID
2015
Springer
8 years 3 months ago
Towards Automatic Inference of Kernel Object Semantics from Binary Code
This paper presents ARGOS, the first system that can automatically uncover the semantics of kernel objects directly from a kernel binary. Based on the principle of data use reveal...
Junyuan Zeng, Zhiqiang Lin
RAID
2015
Springer
8 years 3 months ago
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks
Abstract. Software systems are often engineered and tested for functionality under normal rather than worst-case conditions. This makes the systems vulnerable to denial of service ...
Mohamed Elsabagh, Daniel Barbará, Dan Fleck...
RAID
2015
Springer
8 years 3 months ago
A Formal Framework for Program Anomaly Detection
Abstract. Program anomaly detection analyzes normal program behaviors and discovers aberrant executions caused by attacks, misconfigurations, program bugs, and unusual usage patte...
Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryde...
RAID
2015
Springer
8 years 3 months ago
Ensemble Learning for Low-Level Hardware-Supported Malware Detection
Recent work demonstrated hardware-based online malware detection using only low-level features. This detector is envisioned as a first line of defense that prioritizes the applica...
Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick,...
RAID
2015
Springer
8 years 3 months ago
Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors
In this paper, we present the design and implementation of Haetae, a high-performance Suricata-based NIDS on many-core processors (MCPs). Haetae achieves high performance with thre...
Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Don...
RAID
2015
Springer
8 years 3 months ago
HelDroid: Dissecting and Detecting Mobile Ransomware
In ransomware attacks, the actual target is the human, as opposed to the classic attacks that abuse the infected devices (e.g., botnet renting, information stealing). Mobile device...
Nicoló Andronio, Stefano Zanero, Federico M...