致敬 发表于 2025-3-23 10:11:00

0302-9743 l Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web sec

Modify 发表于 2025-3-23 15:14:02

Minemu: The World’s Fastest Taint Trackermance is significantly better than that of existing systems, despite the fact that we have not applied some of their optimizations yet. We believe that the new design may be suitable for certain classes of applications in production systems.

不要严酷 发表于 2025-3-23 20:15:18

Automated Identification of Cryptographic Primitives in Binary Programst characterize specific, unique aspects of cryptographic code. Our evaluation shows that these methods improve the state-of-the-art approaches in this area and that we can successfully extract cryptographic keys from a given malware binary.

欲望小妹 发表于 2025-3-24 00:21:00

http://reply.papertrans.cn/83/8229/822813/822813_14.png

拒绝 发表于 2025-3-24 03:36:13

Modeling User Search Behavior for Masquerade Detectionntal results show that modeling search behavior reliably detects all masqueraders with a very low false positive rate of 1.1%, far better than prior published results. The limited set of features used for search behavior modeling also results in large performance gains over the same modeling techniques that use larger sets of features.

Parley 发表于 2025-3-24 09:50:42

http://reply.papertrans.cn/83/8229/822813/822813_16.png

synchronous 发表于 2025-3-24 14:15:47

http://reply.papertrans.cn/83/8229/822813/822813_17.png

transplantation 发表于 2025-3-24 18:13:27

Conference proceedings 2011, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.

pessimism 发表于 2025-3-24 19:17:20

http://reply.papertrans.cn/83/8229/822813/822813_19.png

Abnormal 发表于 2025-3-25 00:06:08

: Tracking Dynamic Code Identitysuch as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are fundamentally static. That is, code identity is captured at program load-time and, thus, does not reflect the dynamic
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Recent Advances in Intrusion Detection; 14th International S Robin Sommer,Davide Balzarotti,Gregor Maier Conference proceedings 2011 Spring