Muutke küpsiste eelistusi

E-raamat: Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 -July 1, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021.
The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.
Hybrid Pruning: Towards Precise Pointer and Taint Analysis
1(22)
Dipanjan Das
Priyanka Bose
Aravind Machiry
Sebastiano Mariani
Yan Shoshitaishvili
Giovanni Vigna
Christopher Kruegel
Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models
23(19)
Laurens D'Hooge
Miel Verkerken
Bruno Volckaert
Tim Wauters
Filip De Turck
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
42(11)
Francesco Meloni
Alessandro Sanna
Davide Maiorca
Giorgio Giacinto
COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks
53(22)
Michael Wang
Alexander Interrante-Grant
Ryan Whelan
Tim Leek
Prioritizing Antivirus Alerts on Internal Enterprise Machines
75(21)
Shay Sakazi
Yuval Elovici
Asaf Shabtai
VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR
96(20)
Joschua Schilling
Tilo Muller
Branch Different - Spectre Attacks on Apple Silicon
116(20)
Lorenz Hetterich
Michael Schwarz
MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys
136(20)
William Blair
William Robertson
Manuel Egele
A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities
156(22)
Bhupendra Acharya
Phani Vadrevu
Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks
178(19)
Mizuki Kondo
Rui Tanabe
Natsuo Shintani
Daisuke Makita
Katsunari Yoshioka
Tsutomu Matsumoto
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots
197(22)
Songsong Liu
Pengbin Feng
Jiahao Cao
Xu He
Tommy Chin
Kun Sun
Qi Li
Author Index 219