default search action
DIMVA 2014: Egham, UK
- Sven Dietrich:
Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings. Lecture Notes in Computer Science 8550, Springer 2014, ISBN 978-3-319-08508-1
Malware I
- Asia Slowinska, István Haller, Andrei Bacs, Silviu Baranga, Herbert Bos:
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables). 1-20 - Brian E. Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux, Arun Lakhotia, Avi Pfeffer:
Identifying Shared Software Components to Support Malware Forensics. 21-40 - Dennis Andriesse, Herbert Bos:
Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract). 41-50
Mobile Security
- Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis:
AndRadar: Fast Discovery of Android Applications in Alternative Markets. 51-71 - Xiao Zhang, Wenliang Du:
Attacks on Android Clipboard. 72-91 - Cristiano Giuffrida, Kamil Majdanik, Mauro Conti, Herbert Bos:
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. 92-111
Malware II
- Aziz Mohaisen, Omar Alrawi:
AV-Meter: An Evaluation of Antivirus Scans and Labels. 112-131 - Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
PExy: The Other Side of Exploit Kits. 132-151 - Andrew G. West, Aziz Mohaisen:
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware. 152-171
Network Security
- René Rietz, Michael Vogel, Franka Schuster, Hartmut König:
Parallelization of Network Intrusion Detection Systems under Attack Conditions. 172-191 - Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero:
Phoenix: DGA-Based Botnet Tracking and Intelligence. 192-211
Host Security
- Anil Kurmus, Sergej Dechand, Rüdiger Kapitza:
Quantifiable Run-Time Kernel Attack Surface Reduction. 212-234 - Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla:
Bee Master: Detecting Host-Based Code Injection Attacks. 235-254 - Tielei Wang, Chengyu Song, Wenke Lee:
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. 255-275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.