


default search action
DIMVA 2017: Bonn, Germany
- Michalis Polychronakis, Michael Meier:

Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings. Lecture Notes in Computer Science 10327, Springer 2017, ISBN 978-3-319-60875-4
Enclaves and Isolation
- Michael Schwarz, Samuel Weiser, Daniel Gruss

, Clémentine Maurice
, Stefan Mangard
:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. 3-24 - Shruti Tople, Prateek Saxena:

On the Trade-Offs in Oblivious Execution Techniques. 25-47 - Myoung Jin Nam, Wonhong Nam, Jin-Young Choi

, Periklis Akritidis:
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems. 48-69
Malware Analysis
- Mario Polino, Andrea Continella

, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero
:
Measuring and Defeating Anti-Instrumentation-Equipped Malware. 73-96 - Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua:

DynODet: Detecting Dynamic Obfuscation in Malware. 97-118 - George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras

, Claudia Eckert:
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. 119-138
Cyber-physical Systems
- Mark Luchs, Christian Doerr:

Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems. 141-160 - Mordechai Guri, Boris Zadov, Yuval Elovici:

LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. 161-184 - Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero

:
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. 185-206
Detection and Protection
- Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla:

Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps. 209-229 - Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li:

SPEAKER: Split-Phase Execution of Application Containers. 230-251 - Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou:

Deep Ground Truth Analysis of Current Android Malware. 252-276
Code Analysis
- Sam L. Thomas, Flavio D. Garcia, Tom Chothia:

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. 279-300 - Paria Shirani

, Lingyu Wang, Mourad Debbabi
:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. 301-324 - Deqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong:

SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. 325-344
Web Security
- Olivier Heen, Christoph Neumann:

On the Privacy Impacts of Publicly Leaked Password Databases. 347-365 - Pavlos Lamprakis, Ruggiero Dargenio, David Gugelmann, Vincent Lenders

, Markus Happe
, Laurent Vanbever:
Unsupervised Detection of APT C&C Channels using Web Request Graphs. 366-387 - Yizheng Chen, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon:

Measuring Network Reputation in the Ad-Bidding Process. 388-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














