Assessing the Trustworthiness of Drivers (English)
- New search for: Zhang, S.
- New search for: Liu, P.
- New search for: Zhang, S.
- New search for: Liu, P.
- New search for: Balzarotti, Davide
- New search for: Stolfo, Salvatore J.
- New search for: Cova, Marco
In:
Research in attacks, intrusions and defenses; Research in attacks
7462
;
42-63
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Assessing the Trustworthiness of Drivers
-
Contributors:
-
Conference:International symposium; 15th, Research in attacks, intrusions and defenses; Research in attacks ; 2012 ; Amsterdam
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE , 7462 ; 42-63
-
Publisher:
- New search for: Springer-Verlag
-
Publication date:2012-01-01
-
Size:22 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Trusted VM Snapshots in Untrusted Cloud InfrastructuresSrivastava, A. / Raj, H. / Giffin, J. / England, P. et al. | 2012
- 22
-
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted IntrospectionCarbone, M. / Conover, M. / Montague, B. / Lee, W. et al. | 2012
- 42
-
Assessing the Trustworthiness of DriversZhang, S. / Liu, P. et al. | 2012
- 64
-
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating ThreatThonnard, O. / Bilge, L. / O Gorman, G. / Kiernan, S. / Lee, M. et al. | 2012
- 86
-
Memory Errors: The Past, the Present, and the Futurevan der Veen, V. / dutt-Sharma, N. / Cavallaro, L. / Bos, H. et al. | 2012
- 107
-
A Memory Access Validation Scheme against Payload Injection AttacksAhn, D. / Lee, G. et al. | 2012
- 127
-
Dione: A Flexible Disk Monitoring and Analysis FrameworkMankin, J. / Kaeli, D. et al. | 2012
- 147
-
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc NetworksXu, Z. / Hsu, H. / Chen, X. / Zhu, S. / Hurson, A.R. et al. | 2012
- 169
-
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward SchemesLauinger, T. / Kirda, E. / Michiardi, P. et al. | 2012
- 190
-
Proactive Discovery of Phishing Related Domain NamesMarchal, S. / Francois, J. / State, R. / Engel, T. et al. | 2012
- 210
-
Evaluating Electricity Theft Detectors in Smart Grid NetworksMashima, D. / Cardenas, A.A. et al. | 2012
- 230
-
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning AttacksZhang, J. / Yang, C. / Xu, Z. / Gu, G. et al. | 2012
- 254
-
DEMACRO: Defense against Malicious Cross-Domain RequestsLekies, S. / Nikiforakis, N. / Tighzert, W. / Piessens, F. / Johns, M. et al. | 2012
- 274
-
FlashDetect: ActionScript 3 Malware DetectionVan Overveldt, T. / Kruegel, C. / Vigna, G. et al. | 2012
- 294
-
ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion DetectionChu, J. / Ge, Z. / Huber, R. / Ji, P. / Yates, J. / Yu, Y.-C. et al. | 2012
- 314
-
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time IntelligenceAmann, B. / Sommer, R. / Sharma, A. / Hall, S. et al. | 2012
- 334
-
GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose ProcessorsValgenti, V.C. / Chhugani, J. / Sun, Y. / Satish, N. / Kim, M.S. / Kim, C. / Dubey, P. et al. | 2012
- 354
-
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary ProtocolsHadziosmanovic, D. / Simionato, L. / Bolzoni, D. / Zambon, E. / Etalle, S. et al. | 2012
- 374
-
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)Mahmood, S. / Desmedt, Y. et al. | 2012
- 376
-
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)Xiang, C. / Jinqiao, S. / Peng, L. / Chaoge, L. et al. | 2012
- 378
-
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract)Jinyu, W. / Lihua, Y. / Binxing, F. et al. | 2012
- 380
-
Automatic Covert Channel Detection in Asbestos System (Poster Abstract)Jin, S. / Yang, Z. / Cui, X. et al. | 2012
- 382
-
EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract)Qiao, D. / Liu, T. / Sun, Y. / Guo, L. et al. | 2012
- 384
-
Distress Detection (Poster Abstract)Vella, M. / Terzis, S. / Roper, M. et al. | 2012
- 386
-
Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract)Sanchez, J.A.P. / Villalba, L.J.G. et al. | 2012
- 388
-
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract)Shosha, A.F. / James, J.I. / Liu, C.-C. / Gladyshev, P. et al. | 2012
- 390
-
Accurate Recovery of Functions in a Retargetable Decompiler (Poster Abstract)Durfina, L. / Kroustek, J. / Zemek, P. / Kabele, B. et al. | 2012
- 393
-
Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract)Vega, H.V. / Vidal, J.M. / Castro, J.D.M. / Villalba, L.J.G. et al. | 2012
- 395
-
Concurrency Optimization for NIDS (Poster Abstract)Vidal, J.M. / Vega, H.V. / Castro, J.D.M. / Villalba, L.J.G. et al. | 2012
- 397
-
Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract)Villalba, L.J.G. / Castro, J.D.M. / Orozco, A.L.S. / Puentes, J.M. et al. | 2012