E-Book, Englisch, 277 Seiten, eBook
Reihe: Security and Cryptology
Dietrich Detection of Intrusions and Malware, and Vulnerability Assessment
Erscheinungsjahr 2014
ISBN: 978-3-319-08509-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings
E-Book, Englisch, 277 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-319-08509-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware.- AndRadar: Fast Discovery of Android Applications in Alternative Markets.- Attacks on Android Clipboard.- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.- AV-Meter: An Evaluation of Antivirus Scans and Labels.- PExy: The Other Side of Exploit Kits.- Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.- Parallelization of Network Intrusion Detection Systems under Attack Conditions.- Phoenix: DGA-Based Botnet Tracking and Intelligence.- Quantifiable Run-Time Kernel Attack Surface Reduction.- Bee Master: Detecting Host-Based Code Injection Attacks.- Diagnosis and Emergency Patch Generation for Integer Overflow Exploits.