Muutke küpsiste eelistusi

E-raamat: Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.

The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation. 
Wild Wild Web
Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions
3(20)
Aidan Beggs
Alexandras Kapravelos
New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild
23(20)
Marius Musch
Christian Wressnegger
Martin Johns
Konrad Rieck
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting
43(24)
Pierre Laperdrix
Gildas Avoine
Benoit Baudry
Nick Nikiforakis
On the Perils of Leaking Referrers in Online Collaboration Services
67(22)
Beliz Kaleli
Manuel Egele
Gianluca Stringhini
Cyber-Physical Systems
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems
89(20)
Olivier Cabana
Amr M. Youssef
Mourad Debbabi
Bernard Lebel
Marthe Kassouf
Basile L. Agba
Overshadow PLC to Detect Remote Control-Logic Injection Attacks
109(24)
Hyunguk Yoo
Sushma Kalle
Jared Smith
Irfan Ahmed
A Security Evaluation of Industrial Radio Remote Controllers
133(21)
Federico Maggi
Marco Balduzzi
Jonathan Andersson
Philippe Lin
Stephen Hilt
Akira Urano
Rainer Vosseler
Understanding the Security of Traffic Signal Infrastructure
154(23)
Zhenyu Ning
Fengwei Zhang
Stephen Remias
Malware
Practical Enclave Malware with Intel SGX
177(20)
Michael Schwarz
Samuel Weiser
Daniel Gruss
How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement
197(22)
Yoshihiro Oyama
On Deception-Based Protection Against Cryptographic Ransomware
219(21)
Ziya Alper Genq
Gabriele Lenzini
Daniele Sgandurra
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware
240(23)
Denis Ugarte
Davide Maiorca
Fabrizio Cara
Giorgio Giacinto
Software Security and Binary Analysis
Memory Categorization: Separating Attacker-Controlled Data
263(25)
Matthias Neugschwandtner
Alessandro Sorniotti
Anil Kurmus
TypeMiner: Recovering Types in Binary Programs Using Machine Learning
288(21)
Alwin Maier
Hugo Gascon
Christian Wressnegger
Konrad Rieck
SAFE: Self-Attentive Function Embeddings for Binary Similarity
309(21)
Luca Massarelli
Giuseppe Antonio Di Luna
Fabio Petroni
Roberto Baldoni
Leonardo Querzoni
Triggerflow: Regression Testing by Advanced Execution Path Inspection
330(23)
Iaroslav Gridin
Cesar Pereida Garcia
Nicola Tuveri
Billy Bob Brumley
Network Security
Large-Scale Analysis of Infrastructure-Leaking DNS Servers
353(21)
Dennis Tatang
Carl Schneider
Thorslen Holz
Security in Plain TXT: Observing the Use of DNS TXT Records in the Wild
374(22)
Adam Portier
Henry Carter
Charles Lever
No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP
396(19)
Stefan Mehner
Hartmut Konig
DPX: Data-Plane extensions for SDN Security Service Instantiation
415(26)
Taejune Park
Yeonkeun Kim
Vinod Yegneswaran
Phillip Porras
Zhaoyan Xu
Kyoung Soo Park
Seungwon Shin
Attack Mitigation
Practical Password Hardening Based on TLS
441(20)
Constantinos Diomedous
Elias Athanasopoulos
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks
461(21)
Davide Fauri
Michail Kapsalakis
Daniel Ricardo dos Santos
Elisa Costante
Jerry den Hartog
Sandro Etalle
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
482(21)
Nilo Redini
Ruoyu Wang
Aravind Machiry
Yan Shoshitaishvili
Giovanni Vigna
Christopher Kruegel
Author Index 503