DIMVA B

18 papers

YearTitle / Authors
2015"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.
Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos
2015C5: Cross-Cores Cache Covert Channel.
Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon
2015Capturing DDoS Attack Dynamics Behind the Scenes.
An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen
2015Controlled Data Sharing for Collaborative Predictive Blacklisting.
Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito
2015Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.
Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda
2015Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
Magnus Almgren, Vincenzo Gulisano, Federico Maggi
2015Fine-Grained Control-Flow Integrity Through Binary Hardening.
Mathias Payer, Antonio Barresi, Thomas R. Gross
2015Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.
Yuan Yang, Zhongmin Cai, Weixuan Mao, Zhihai Yang
2015Intrusion Detection for Airborne Communication Using PHY-Layer Information.
Martin Strohmeier, Vincent Lenders, Ivan Martinovic
2015Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.
Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero
2015May I? - Content Security Policy Endorsement for Browser Extensions.
Daniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld
2015More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler
2015On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna
2015Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.
Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis
2015Quit Playing Games with My Heart: Understanding Online Dating Scams.
Jingmin Huang, Gianluca Stringhini, Peng Yong
2015Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics.
Tobias Wüchner, Martín Ochoa, Alexander Pretschner
2015That Ain't You: Blocking Spearphishing Through Behavioral Modelling.
Gianluca Stringhini, Olivier Thonnard
2015The Role of Cloud Services in Malicious Software: Trends and Insights.
Xiao Han, Nizar Kheir, Davide Balzarotti