DIMVA B

19 papers

YearTitle / Authors
2018BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna
2018Bytecode Corruption Attacks Are Real - And How to Defend Against Them.
Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz
2018Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings
Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
2018ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation.
Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero
2018Evasive Malware via Identifier Implanting.
Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow
2018Extended Abstract: Toward Systematically Exploring Antivirus Engines.
Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero
2018FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds.
Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero
2018GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi
2018Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception.
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
2018Honey, I Shrunk Your App Security: The State of Android App Hardening.
Vincent Haupert, Dominik Christian Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller
2018JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
Aurore Fass, Robert P. Krawczyk, Michael Backes, Ben Stock
2018Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking.
Iskander Sánchez-Rola, Igor Santos
2018Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis.
Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt
2018MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
Michael Brengel, Christian Rossow
2018No Random, No Ransom: A Key to Stop Cryptographic Ransomware.
Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
2018On the Weaknesses of Function Table Randomization.
Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz
2018Spearphishing Malware: Do We Really Know the Unknown?
Yanko Baychev, Leyla Bilge
2018Symbolic Deobfuscation: From Virtualized Code Back to the Original.
Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet
2018Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats.
Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee