Skip to main content
  • Conference proceedings
  • © 2012

Research in Attacks, Intrusions and Defenses

15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7462)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Virtualization

    1. Trusted VM Snapshots in Untrusted Cloud Infrastructures

      • Abhinav Srivastava, Himanshu Raj, Jonathon Giffin, Paul England
      Pages 1-21
    2. Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection

      • Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee
      Pages 22-41
    3. Assessing the Trustworthiness of Drivers

      • Shengzhi Zhang, Peng Liu
      Pages 42-63
  3. Attacks and Defenses

    1. Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat

      • Olivier Thonnard, Leyla Bilge, Gavin O’Gorman, Seán Kiernan, Martin Lee
      Pages 64-85
    2. Memory Errors: The Past, the Present, and the Future

      • Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos
      Pages 86-106
  4. Host and Network Security

    1. Dione: A Flexible Disk Monitoring and Analysis Framework

      • Jennifer Mankin, David Kaeli
      Pages 127-146
    2. AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks

      • Zhi Xu, Hungyuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson
      Pages 147-168
  5. Fraud Detection and Underground Economy

    1. Paying for Piracy? An Analysis of One-Click Hosters’ Controversial Reward Schemes

      • Tobias Lauinger, Engin Kirda, Pietro Michiardi
      Pages 169-189
    2. Proactive Discovery of Phishing Related Domain Names

      • Samuel Marchal, Jérôme François, Radu State, Thomas Engel
      Pages 190-209
    3. Evaluating Electricity Theft Detectors in Smart Grid Networks

      • Daisuke Mashima, Alvaro A. Cárdenas
      Pages 210-229
  6. Web Security

    1. DEMACRO: Defense against Malicious Cross-Domain Requests

      • Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns
      Pages 254-273
    2. FlashDetect: ActionScript 3 Malware Detection

      • Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna
      Pages 274-293
  7. Intrusion Detection

    1. ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection

      • Jie Chu, Zihui Ge, Richard Huber, Ping Ji, Jennifer Yates, Yung-Chao Yu
      Pages 294-313
    2. A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence

      • Johanna Amann, Robin Sommer, Aashish Sharma, Seth Hall
      Pages 314-333
    3. GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors

      • Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim et al.
      Pages 334-353
    4. N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols

      • Dina Hadžiosmanović, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle
      Pages 354-373
  8. Poster Abstracts

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

About this book

This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.

Editors and Affiliations

  • Institute Eurecom, Sophia Antipolis Cedex, France

    Davide Balzarotti

  • Department of Computer Science, Columbia University, New York, USA

    Salvatore J. Stolfo

  • School of Computer Science, University of Birmingham, Edgbaston, UK

    Marco Cova

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access