


default search action
DIMVA 2018: Saclay, France
- Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc:

Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings. Lecture Notes in Computer Science 10885, Springer 2018, ISBN 978-3-319-93410-5
Malware Analysis
- Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt

:
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. 3-23 - Michael Brengel, Christian Rossow:

MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps. 24-45 - Yanko Baychev, Leyla Bilge:

Spearphishing Malware: Do We Really Know the Unknown? 46-66
Mobile and Embedded Security
- Vincent Haupert, Dominik Christian Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller:

Honey, I Shrunk Your App Security: The State of Android App Hardening. 69-91 - Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi:

GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. 92-113 - Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi

, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. 114-138
Attacks
- Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee:

Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats. 141-161 - Rui Tanabe

, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow:
Evasive Malware via Identifier Implanting. 162-184 - Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz

:
On the Weaknesses of Function Table Randomization. 185-207
Detection and Containment
- Michele Carminati

, Alessandro Baggio, Federico Maggi, Umberto Spagnolini
, Stefano Zanero
:
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds. 211-233 - Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan

:
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. 234-255 - Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin:

Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception. 256-278
Web and Browser Security
- Iskander Sánchez-Rola, Igor Santos:

Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking. 281-302 - Aurore Fass, Robert P. Krawczyk, Michael Backes, Ben Stock:

JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. 303-325 - Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert

, Michael Franz:
Bytecode Corruption Attacks Are Real - And How to Defend Against Them. 326-348
Reverse Engineering
- Pietro De Nicolao, Marcello Pogliani

, Mario Polino, Michele Carminati
, Davide Quarta, Stefano Zanero
:
ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. 351-371 - Jonathan Salwan, Sébastien Bardin

, Marie-Laure Potet:
Symbolic Deobfuscation: From Virtualized Code Back to the Original. 372-392 - Davide Quarta, Federico Salvioni, Andrea Continella

, Stefano Zanero
:
Extended Abstract: Toward Systematically Exploring Antivirus Engines. 393-403

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














