default search action
DIMVA 2016: San Sebastián, Spain
- Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez:
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings. Lecture Notes in Computer Science 9721, Springer 2016, ISBN 978-3-319-40666-4
Attacks
- Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti:
Subverting Operating System Properties Through Evolutionary DKOM Attacks. 3-24 - Konstantin Böttinger, Claudia Eckert:
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract). 25-34
Defenses
- Jeff H. Perkins, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, Martin C. Rinard:
AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks. 37-57 - Sergio Pastrana, Juan E. Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López:
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices. 58-77 - Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Towards Vulnerability Discovery Using Staged Program Analysis. 78-97
Malware Detection
- Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck:
Comprehensive Analysis and Detection of Flash-Based Malware. 101-121 - Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Reviewer Integration and Performance Measurement for Malware Detection. 122-141 - Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. 142-162
Evasion
- Andre Pawlowski, Moritz Contag, Thorsten Holz:
Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows. 165-185 - Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas:
RAMBO: Run-Time Packer Analysis with Multiple Branch Observation. 186-206 - Michael Brengel, Michael Backes, Christian Rossow:
Detecting Hardware-Assisted Virtualization. 207-227
Web Security
- Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell:
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. 231-254 - Flavio Toffalini, Maurizio Abbà, Damiano Carra, Davide Balzarotti:
Google Dorks: Analysis, Creation, and New Defenses. 255-275
Data Leaks
- Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard:
Flush+Flush: A Fast and Stealthy Cache Attack. 279-299 - Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. 300-321 - Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz:
Detile: Fine-Grained Information Leak Detection in Script Engines. 322-342 - Panagiotis Kintis, Yacin Nadji, David Dagon, Michael Farrell, Manos Antonakakis:
Understanding the Privacy Implications of ECS - (Extended Abstract). 343-353
Authentication
- Wanpeng Li, Chris J. Mitchell:
Analysing the Security of Google's Implementation of OpenID Connect. 357-376 - Thomas Hupperich, Henry Hosseini, Thorsten Holz:
Leveraging Sensor Fingerprinting for Mobile Device Authentication. 377-396
Malware Classification
- Wenyi Huang, Jack W. Stokes:
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. 399-418 - Bojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert:
Adaptive Semantics-Aware Malware Classification. 419-439
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.