DIMVA B

19 papers

YearTitle / Authors
2017A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.
Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero
2017BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Paria Shirani, Lingyu Wang, Mourad Debbabi
2017Deep Ground Truth Analysis of Current Android Malware.
Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou
2017Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
Michalis Polychronakis, Michael Meier
2017DynODet: Detecting Dynamic Obfuscation in Malware.
Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua
2017Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage.
George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert
2017HumIDIFy: A Tool for Hidden Functionality Detection in Firmware.
Sam L. Thomas, Flavio D. Garcia, Tom Chothia
2017LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
Mordechai Guri, Boris Zadov, Yuval Elovici
2017Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems.
Mark Luchs, Christian Doerr
2017Malware Guard Extension: Using SGX to Conceal Cache Attacks.
Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard
2017Measuring Network Reputation in the Ad-Bidding Process.
Yizheng Chen, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon
2017Measuring and Defeating Anti-Instrumentation-Equipped Malware.
Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero
2017MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems.
Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis
2017On the Privacy Impacts of Publicly Leaked Password Databases.
Olivier Heen, Christoph Neumann
2017On the Trade-Offs in Oblivious Execution Techniques.
Shruti Tople, Prateek Saxena
2017Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps.
Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla
2017SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection.
Deqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong
2017SPEAKER: Split-Phase Execution of Application Containers.
Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li
2017Unsupervised Detection of APT C&C Channels using Web Request Graphs.
Pavlos Lamprakis, Ruggiero Dargenio, David Gugelmann, Vincent Lenders, Markus Happe, Laurent Vanbever