E-Book, Englisch, Band 9148, 351 Seiten, eBook
Almgren / Gulisano / Maggi Detection of Intrusions and Malware, and Vulnerability Assessment
Erscheinungsjahr 2015
ISBN: 978-3-319-20550-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
E-Book, Englisch, Band 9148, 351 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-319-20550-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.- “Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.- C5: Cross-Cores Cache Covert Channel.- Intrusion Detection for Airborne Communication Using PHY-Layer Information.- That Ain’t You: Blocking Spearphishing Through Behavioral Modelling.- Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics.- Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.- Fine-Grained Control-Flow Integrity Through Binary Hardening.- Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.- The Role of Cloud Services in MaliciousSoftware: Trends and Insights.- Capturing DDoS Attack Dynamics Behind the Scenes.- Quit Playing Games with My Heart: Understanding Online Dating Scams.- More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.- May I? - Content Security Policy Endorsement for Browser Extensions.- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.- Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.- Controlled Data Sharing for Collaborative Predictive Blacklisting.