Muutke küpsiste eelistusi

Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings 2015 ed. [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 351 pages, kõrgus x laius: 235x155 mm, kaal: 5504 g, 98 Illustrations, black and white; XII, 351 p. 98 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 9148
  • Ilmumisaeg: 06-Jul-2015
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319205498
  • ISBN-13: 9783319205496
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 351 pages, kõrgus x laius: 235x155 mm, kaal: 5504 g, 98 Illustrations, black and white; XII, 351 p. 98 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 9148
  • Ilmumisaeg: 06-Jul-2015
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319205498
  • ISBN-13: 9783319205496
This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015.
The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.
Attacks
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
3(22)
Amin Kharraz
William Robertson
Davide Balzarotti
Leyla Bilge
En Gin Kirda
"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them
25(21)
Bernhard Grill
Andrei Bacs
Christian Platzer
Herbert Bos
C5: Cross-Cores Cache Covert Channel
46(21)
Clementine Maurice
Christoph Neumann
Olivier Heen
Aurelien Francillon
Attack Detection
Intrusion Detection for Airborne Communication Using PHY-Layer Information
67(11)
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
That Ain't You: Blocking Spearphishing Through Behavioral Modelling
78(20)
Gianluca Stringhini
Olivier Thonnard
Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics
98(23)
Tobias Wuchner
Martin Ochoa
Alexander Pretschner
Binary Analysis and Mobile Malware Protection
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries
121(23)
Mario Polino
Andrea Scorti
Federico Maggi
Stefano Zanero
Fine-Grained Control-Flow Integrity Through Binary Hardening
144(21)
Mathias Payer
Antonio Barresi
Thomas R. Gross
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software
165(22)
Iasonas Polakis
Michalis Diamantaris
Thanasis Petsas
Federico Maggi
Sotiris Ioannidis
Social Networks and Large-Scale Attacks
The Role of Cloud Services in Malicious Software: Trends and Insights
187(18)
Xiao Han
Nizar Kheir
Davide Balzarotti
Capturing DDoS Attack Dynamics Behind the Scenes
205(11)
An Wang
Aziz Mohaisen
Wentao Chang
Songqing Chen
Quit Playing Games with My Heart: Understanding Online Dating Scams
216(23)
JingMin Huang
Gianluca Stringhini
Peng Yong
Web and Mobile Security
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations
239(22)
Ethan Shernan
Henry Carter
Dave Tian
Patrick Traynor
Kevin Butler
May I? - Content Security Policy Endorsement for Browser Extensions
261(21)
Daniel Hausknecht
Jonas Magazinius
Andrei Sabelfeld
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users
282(25)
Yanick Fratantonio
Antonio Bianchi
William Robertson
Manuel Egele
Christopher Kruegel
Engin Kirda
Giovanni Vigna
Provenance and Data Sharing
Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network
307(20)
Yuan Yang
Zhongmin Cai
Weixuan Mao
Zhihai Yang
Controlled Data Sharing for Collaborative Predictive Blacklisting
327(24)
Julien Freudiger
Emiliano De Cristofaro
Alejandro E. Brito
Author Index 351