Muutke küpsiste eelistusi

Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 July 1, 2022, Proceedings 1st ed. 2022 [Pehme köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 219 pages, kõrgus x laius: 235x155 mm, kaal: 361 g, 51 Illustrations, color; 12 Illustrations, black and white; XII, 219 p. 63 illus., 51 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 13358
  • Ilmumisaeg: 25-Jun-2022
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031094832
  • ISBN-13: 9783031094835
  • Pehme köide
  • Hind: 67,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 79,09 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 219 pages, kõrgus x laius: 235x155 mm, kaal: 361 g, 51 Illustrations, color; 12 Illustrations, black and white; XII, 219 p. 63 illus., 51 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 13358
  • Ilmumisaeg: 25-Jun-2022
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031094832
  • ISBN-13: 9783031094835
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021.
The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.
Hybrid Pruning: Towards Precise Pointer and Taint Analysis
1(22)
Dipanjan Das
Priyanka Bose
Aravind Machiry
Sebastiano Mariani
Yan Shoshitaishvili
Giovanni Vigna
Christopher Kruegel
Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models
23(19)
Laurens D'Hooge
Miel Verkerken
Bruno Volckaert
Tim Wauters
Filip De Turck
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
42(11)
Francesco Meloni
Alessandro Sanna
Davide Maiorca
Giorgio Giacinto
COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks
53(22)
Michael Wang
Alexander Interrante-Grant
Ryan Whelan
Tim Leek
Prioritizing Antivirus Alerts on Internal Enterprise Machines
75(21)
Shay Sakazi
Yuval Elovici
Asaf Shabtai
VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR
96(20)
Joschua Schilling
Tilo Muller
Branch Different - Spectre Attacks on Apple Silicon
116(20)
Lorenz Hetterich
Michael Schwarz
MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys
136(20)
William Blair
William Robertson
Manuel Egele
A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities
156(22)
Bhupendra Acharya
Phani Vadrevu
Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks
178(19)
Mizuki Kondo
Rui Tanabe
Natsuo Shintani
Daisuke Makita
Katsunari Yoshioka
Tsutomu Matsumoto
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots
197(22)
Songsong Liu
Pengbin Feng
Jiahao Cao
Xu He
Tommy Chin
Kun Sun
Qi Li
Author Index 219