DIMVA B

24 papers

YearTitle / Authors
2019A Security Evaluation of Industrial Radio Remote Controllers.
Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler
2019BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation.
Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel
2019DPX: Data-Plane eXtensions for SDN Security Service Instantiation.
Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin
2019Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.
Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba
2019Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings
Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren
2019How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement.
Yoshihiro Oyama
2019Large-Scale Analysis of Infrastructure-Leaking DNS Servers.
Dennis Tatang, Carl Richard Theodor Schneider, Thorsten Holz
2019Memory Categorization: Separating Attacker-Controlled Data.
Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus
2019Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting.
Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis
2019New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild.
Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck
2019No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP.
Stefan Mehner, Hartmut König
2019On Deception-Based Protection Against Cryptographic Ransomware.
Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra
2019On the Perils of Leaking Referrers in Online Collaboration Services.
Beliz Kaleli, Manuel Egele, Gianluca Stringhini
2019Overshadow PLC to Detect Remote Control-Logic Injection Attacks.
Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed
2019PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware.
Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto
2019Practical Enclave Malware with Intel SGX.
Michael Schwarz, Samuel Weiser, Daniel Gruss
2019Practical Password Hardening Based on TLS.
Constantinos Diomedous, Elias Athanasopoulos
2019Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.
Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle
2019SAFE: Self-Attentive Function Embeddings for Binary Similarity.
Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni
2019Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild.
Adam Portier, Henry Carter, Charles Lever
2019Triggerflow: Regression Testing by Advanced Execution Path Inspection.
Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
2019TypeMiner: Recovering Types in Binary Programs Using Machine Learning.
Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck
2019Understanding the Security of Traffic Signal Infrastructure.
Zhenyu Ning, Fengwei Zhang, Stephen M. Remias
2019Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions.
Aidan Beggs, Alexandros Kapravelos