Research in Attacks, Intrusions, and Defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Dacier, Marc. (Editor ), Bailey, Michael. (Editor ), Polychronakis, Michalis. (Editor ), Antonakakis, Manos. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Security and Cryptology ; 10453
Materias:
LEADER 03266nam a22004455i 4500
001 000292791
005 20210923153333.0
007 cr nn 008mamaa
008 171012s2017 gw | s |||| 0|eng d
020 |a 9783319663326 
024 7 |a 10.1007/978-3-319-66332-6  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Research in Attacks, Intrusions, and Defenses :  |b 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings /  |c edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XIII, 496 p. 115 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Security and Cryptology ;  |v 10453 
505 0 |a VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers            -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Operating systems (Computers). 
650 1 4 |a Systems and Data Security. 
650 2 4 |a Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Operating Systems. 
700 1 |a Dacier, Marc.  |e editor. 
700 1 |a Bailey, Michael.  |e editor. 
700 1 |a Polychronakis, Michalis.  |e editor. 
700 1 |a Antonakakis, Manos.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks