Название: Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
Автор: Michalis Polychronakis, Michael Meier
Издательство: Springer
Год: 2017
ISBN: 9783319608754
Серия: Lecture Notes in Computer Science (Book 10327)
Формат: pdf
Страниц: 412
Размер: 27,8 mb
Язык: English
The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Schwarz, Michael (et al.)
Pages 3-24
On the Trade-Offs in Oblivious Execution Techniques
Tople, Shruti (et al.)
Pages 25-47
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
Nam, Myoung Jin (et al.)
Pages 48-69
Measuring and Defeating Anti-Instrumentation-Equipped Malware
Polino, Mario (et al.)
Pages 73-96
DynODet: Detecting Dynamic Obfuscation in Malware
Kim, Danny (et al.)
Pages 97-118
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
Webster, George D. (et al.)
Pages 119-138
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
Luchs, Mark (et al.)
Pages 141-160
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
Guri, Mordechai (et al.)
Pages 161-184
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks
Palanca, Andrea (et al.)
Pages 185-206
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
Barabosch, Thomas (et al.)
Pages 209-229
SPEAKER: Split-Phase Execution of Application Containers
Lei, Lingguang (et al.)
Pages 230-251
Deep Ground Truth Analysis of Current Android Malware
Wei, Fengguo (et al.)
Pages 252-276
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
Thomas, Sam L. (et al.)
Pages 279-300
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
Shirani, Paria (et al.)
Pages 301-324
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
Zou, Deqing (et al.)
Pages 325-344
On the Privacy Impacts of Publicly Leaked Password Databases
Heen, Olivier (et al.)
Pages 347-365
Unsupervised Detection of APT C&C Channels using Web Request Graphs
Lamprakis, Pavlos (et al.)
Pages 366-387
Measuring Network Reputation in the Ad-Bidding Process
Chen, Yizheng (et al.)
Pages 388-409
Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации