DIMVA B

29 papers

YearTitle / Authors
2024Acoustic Side-Channel Attacks on a Computer Mouse.
Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik
2024Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity.
Suguru Horimoto, Keane Lucas, Lujo Bauer
2024Bringing UFUs Back into the Air with FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners.
Sebastian Neef, Maath Oudeh
2024Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks.
Mohammad Ali Tofighi, Behzad Ousat, Javad Zandi, Esteban Schafir, Amin Kharraz
2024Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings
Federico Maggi, Manuel Egele, Mathias Payer, Michele Carminati
2024Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method.
Cristian Assaiante, Simone Nicchi, Daniele Cono D'Elia, Leonardo Querzoni
2024Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries.
Joshua A. Bockenek, Freek Verbeek, Binoy Ravindran
2024Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps.
Dolière Francis Somé
2024Extended Abstract: A Transfer Learning-Based Training Approach for DGA Classification.
Arthur Drichel, Benedikt von Querfurth, Ulrike Meyer
2024Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids.
Sine Canbolat, Clemens Fruböse, Ghada Elbez, Veit Hagenmeyer
2024Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity.
Arian Soltani, D'Jeff K. Nkashama, Jordan F. Masakuna, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza
2024Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors.
Alexandre D'Hondt, Charles-Henry Bertrand Van Ouytsel, Axel Legay
2024FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids.
Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti
2024GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer.
Ruben Mechelinck, Daniel Dorfmeister, Bernhard Fischer, Stijn Volckaert, Stefan Brunthaler
2024Inferring Recovery Steps from Cyber Threat Intelligence Reports.
Zsolt Levente Kucsván, Marco Caselli, Andreas Peter, Andrea Continella
2024Knocking on Admin's Door: Protecting Critical Web Applications with Deception.
Billy Tsouvalas, Nick Nikiforakis
2024Listening Between the Bits: Privacy Leaks in Audio Fingerprints.
Moritz Pfister, Robert Michael, Max Boll, Cosima Körfer, Konrad Rieck, Daniel Arp
2024Modularizing Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures.
Sofiane Benahmed, Abdullah Qasem, Anis Lounis, Mourad Debbabi
2024Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs.
Trevor Dunlap, John Speed Meyers, Bradley Reaves, William Enck
2024PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location.
Michele Marazzi, Patrick Jattke, Jason Zibung, Kaveh Razavi
2024Presshammer: Rowhammer and Rowpress Without Physical Address Information.
Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, Daniel Gruss
2024S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More.
Ruizhe Wang, Meng Xu, N. Asokan
2024SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables.
Vivin Paliath, Erik Trickel, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili
2024SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs.
Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi
2024Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics.
Anis Lounis, Anthony Andreoli, Mourad Debbabi, Aiman Hanna
2024SmmPack: Obfuscation for SMM Modules with TPM Sealed Key.
Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori
2024Tarallo: Evading Behavioral Malware Detectors in the Problem Space.
Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero
2024Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study.
Lukas Kree, René Helmke, Eugen Winter
2024Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit.
Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L. R. Olivier, Romain Cayre, Mohamed Kaâniche