Название: Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings Автор: Michalis Polychronakis, Michael Meier Издательство: Springer Год: 2017 ISBN: 9783319608754 Серия: Lecture Notes in Computer Science (Book 10327) Формат: pdf Страниц: 412 Размер: 27,8 mb Язык: English
The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
Malware Guard Extension: Using SGX to Conceal Cache Attacks Schwarz, Michael (et al.) Pages 3-24
On the Trade-Offs in Oblivious Execution Techniques Tople, Shruti (et al.) Pages 25-47
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems Nam, Myoung Jin (et al.) Pages 48-69
Measuring and Defeating Anti-Instrumentation-Equipped Malware Polino, Mario (et al.) Pages 73-96
DynODet: Detecting Dynamic Obfuscation in Malware Kim, Danny (et al.) Pages 97-118
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage Webster, George D. (et al.) Pages 119-138
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems Luchs, Mark (et al.) Pages 141-160
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED Guri, Mordechai (et al.) Pages 161-184
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks Palanca, Andrea (et al.) Pages 185-206
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps Barabosch, Thomas (et al.) Pages 209-229
SPEAKER: Split-Phase Execution of Application Containers Lei, Lingguang (et al.) Pages 230-251
Deep Ground Truth Analysis of Current Android Malware Wei, Fengguo (et al.) Pages 252-276
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware Thomas, Sam L. (et al.) Pages 279-300
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape Shirani, Paria (et al.) Pages 301-324
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection Zou, Deqing (et al.) Pages 325-344
On the Privacy Impacts of Publicly Leaked Password Databases Heen, Olivier (et al.) Pages 347-365
Unsupervised Detection of APT C&C Channels using Web Request Graphs Lamprakis, Pavlos (et al.) Pages 366-387
Measuring Network Reputation in the Ad-Bidding Process Chen, Yizheng (et al.) Pages 388-409
|