Название: Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
Автор: Michalis Polychronakis, Michael Meier
Издательство: Springer
Год: 2017
ISBN: 9783319608754
Серия: Lecture Notes in Computer Science (Book 10327)
Формат: pdf
Страниц: 412
Размер: 27,8 mb
Язык: English
The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
Malware Guard Extension: Using SGX to Conceal Cache Attacks Schwarz, Michael (et al.) Pages 3-24 On the Trade-Offs in Oblivious Execution Techniques Tople, Shruti (et al.) Pages 25-47 MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems Nam, Myoung Jin (et al.) Pages 48-69 Measuring and Defeating Anti-Instrumentation-Equipped Malware Polino, Mario (et al.) Pages 73-96 DynODet: Detecting Dynamic Obfuscation in Malware Kim, Danny (et al.) Pages 97-118 Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage Webster, George D. (et al.) Pages 119-138 Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems Luchs, Mark (et al.) Pages 141-160 LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED Guri, Mordechai (et al.) Pages 161-184 A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks Palanca, Andrea (et al.) Pages 185-206 Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps Barabosch, Thomas (et al.) Pages 209-229 SPEAKER: Split-Phase Execution of Application Containers Lei, Lingguang (et al.) Pages 230-251 Deep Ground Truth Analysis of Current Android Malware Wei, Fengguo (et al.) Pages 252-276 HumIDIFy: A Tool for Hidden Functionality Detection in Firmware Thomas, Sam L. (et al.) Pages 279-300 BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape Shirani, Paria (et al.) Pages 301-324 SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection Zou, Deqing (et al.) Pages 325-344 On the Privacy Impacts of Publicly Leaked Password Databases Heen, Olivier (et al.) Pages 347-365 Unsupervised Detection of APT C&C Channels using Web Request Graphs Lamprakis, Pavlos (et al.) Pages 366-387 Measuring Network Reputation in the Ad-Bidding Process Chen, Yizheng (et al.) Pages 388-409
ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!
[related-news]
[/related-news]