↓ Skip to main content

Research in Attacks, Intrusions, and Defenses

Overview of attention for book
Cover of 'Research in Attacks, Intrusions, and Defenses'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform’s Main Memory
  3. Altmetric Badge
    Chapter 2 Hypervisor Memory Forensics
  4. Altmetric Badge
    Chapter 3 Server-Side Code Injection Attacks: A Historical Perspective
  5. Altmetric Badge
    Chapter 4 Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
  6. Altmetric Badge
    Chapter 5 Systematic Analysis of Defenses against Return-Oriented Programming
  7. Altmetric Badge
    Chapter 6 SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel
  8. Altmetric Badge
    Chapter 7 API Chaser: Anti-analysis Resistant Malware Analyzer
  9. Altmetric Badge
    Chapter 8 FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors
  10. Altmetric Badge
    Chapter 9 Deobfuscating Embedded Malware Using Probable-Plaintext Attacks
  11. Altmetric Badge
    Chapter 10 Detecting Traditional Packers, Decisively
  12. Altmetric Badge
    Chapter 11 Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
  13. Altmetric Badge
    Chapter 12 Active Credential Leakage for Observing Web-Based Attack Cycle
  14. Altmetric Badge
    Chapter 13 Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications
  15. Altmetric Badge
    Chapter 14 Tamper-Resistant LikeJacking Protection
  16. Altmetric Badge
    Chapter 15 Deconstructing the Assessment of Anomaly-based Intrusion Detectors
  17. Altmetric Badge
    Chapter 16 Practical Context-Aware Permission Control for Hybrid Mobile Applications
  18. Altmetric Badge
    Chapter 17 Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses
  19. Altmetric Badge
    Chapter 18 Mobile Malware Detection Based on Energy Fingerprints — A Dead End?
  20. Altmetric Badge
    Chapter 19 Research in Attacks, Intrusions, and Defenses
  21. Altmetric Badge
    Chapter 20 Connected Colors: Unveiling the Structure of Criminal Networks
  22. Altmetric Badge
    Chapter 21 CloudFence: Data Flow Tracking as a Cloud Service
  23. Altmetric Badge
    Chapter 22 Practical Attacks against the I2P Network
Attention for Chapter 21: CloudFence: Data Flow Tracking as a Cloud Service
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
44 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
CloudFence: Data Flow Tracking as a Cloud Service
Chapter number 21
Book title
Research in Attacks, Intrusions, and Defenses
Published by
Springer Berlin Heidelberg, October 2013
DOI 10.1007/978-3-642-41284-4_21
Book ISBNs
978-3-64-241283-7, 978-3-64-241284-4
Authors

Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis

Editors

Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright

Mendeley readers

The data shown below were compiled from readership statistics for 44 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 1 2%
Norway 1 2%
Unknown 42 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 14 32%
Student > Master 13 30%
Researcher 6 14%
Other 4 9%
Professor > Associate Professor 2 5%
Other 4 9%
Unknown 1 2%
Readers by discipline Count As %
Computer Science 37 84%
Engineering 4 9%
Business, Management and Accounting 2 5%
Unknown 1 2%