| 2018 | BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna |
| 2018 | Bytecode Corruption Attacks Are Real - And How to Defend Against Them. Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz |
| 2018 | Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc |
| 2018 | ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero |
| 2018 | Evasive Malware via Identifier Implanting. Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow |
| 2018 | Extended Abstract: Toward Systematically Exploring Antivirus Engines. Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero |
| 2018 | FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds. Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero |
| 2018 | GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi |
| 2018 | Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception. Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin |
| 2018 | Honey, I Shrunk Your App Security: The State of Android App Hardening. Vincent Haupert, Dominik Christian Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller |
| 2018 | JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. Aurore Fass, Robert P. Krawczyk, Michael Backes, Ben Stock |
| 2018 | Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking. Iskander Sánchez-Rola, Igor Santos |
| 2018 | Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt |
| 2018 | MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps. Michael Brengel, Christian Rossow |
| 2018 | No Random, No Ransom: A Key to Stop Cryptographic Ransomware. Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan |
| 2018 | On the Weaknesses of Function Table Randomization. Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz |
| 2018 | Spearphishing Malware: Do We Really Know the Unknown? Yanko Baychev, Leyla Bilge |
| 2018 | Symbolic Deobfuscation: From Virtualized Code Back to the Original. Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet |
| 2018 | Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats. Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee |