default search action
DIMVA 2015: Milan, Italy
- Magnus Almgren, Vincenzo Gulisano, Federico Maggi:
Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings. Lecture Notes in Computer Science 9148, Springer 2015, ISBN 978-3-319-20549-6
Attacks
- Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. 3-24 - Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos:
"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. 25-45 - Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon:
C5: Cross-Cores Cache Covert Channel. 46-64
Attack Detection
- Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Intrusion Detection for Airborne Communication Using PHY-Layer Information. 67-77 - Gianluca Stringhini, Olivier Thonnard:
That Ain't You: Blocking Spearphishing Through Behavioral Modelling. 78-97 - Tobias Wüchner, Martín Ochoa, Alexander Pretschner:
Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics. 98-118
Binary Analysis and Mobile Malware Protection
- Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero:
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries. 121-143 - Mathias Payer, Antonio Barresi, Thomas R. Gross:
Fine-Grained Control-Flow Integrity Through Binary Hardening. 144-164 - Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis:
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. 165-184
Social Networks and Large-Scale Attacks
- Xiao Han, Nizar Kheir, Davide Balzarotti:
The Role of Cloud Services in Malicious Software: Trends and Insights. 187-204 - An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Capturing DDoS Attack Dynamics Behind the Scenes. 205-215 - Jingmin Huang, Gianluca Stringhini, Peng Yong:
Quit Playing Games with My Heart: Understanding Online Dating Scams. 216-236
Web and Mobile Security
- Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. 239-260 - Daniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld:
May I? - Content Security Policy Endorsement for Browser Extensions. 261-281 - Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. 282-303
Provenance and Data Sharing
- Yuan Yang, Zhongmin Cai, Weixuan Mao, Zhihai Yang:
Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network. 307-326 - Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito:
Controlled Data Sharing for Collaborative Predictive Blacklisting. 327-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.