default search action
DIMVA 2019: Gothenburg, Sweden
- Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Lecture Notes in Computer Science 11543, Springer 2019, ISBN 978-3-030-22037-2
Wild Wild Web
- Aidan Beggs, Alexandros Kapravelos:
Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions. 3-22 - Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck:
New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. 23-42 - Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis:
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. 43-66 - Beliz Kaleli, Manuel Egele, Gianluca Stringhini:
On the Perils of Leaking Referrers in Online Collaboration Services. 67-85
Cyber-Physical Systems
- Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. 89-108 - Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed:
Overshadow PLC to Detect Remote Control-Logic Injection Attacks. 109-132 - Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler:
A Security Evaluation of Industrial Radio Remote Controllers. 133-153 - Zhenyu Ning, Fengwei Zhang, Stephen M. Remias:
Understanding the Security of Traffic Signal Infrastructure. 154-174
Malware
- Michael Schwarz, Samuel Weiser, Daniel Gruss:
Practical Enclave Malware with Intel SGX. 177-196 - Yoshihiro Oyama:
How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. 197-218 - Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
On Deception-Based Protection Against Cryptographic Ransomware. 219-239 - Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. 240-259
Software Security and Binary Analysis
- Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus:
Memory Categorization: Separating Attacker-Controlled Data. 263-287 - Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck:
TypeMiner: Recovering Types in Binary Programs Using Machine Learning. 288-308 - Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni:
SAFE: Self-Attentive Function Embeddings for Binary Similarity. 309-329 - Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley:
Triggerflow: Regression Testing by Advanced Execution Path Inspection. 330-350
Network Security
- Dennis Tatang, Carl Richard Theodor Schneider, Thorsten Holz:
Large-Scale Analysis of Infrastructure-Leaking DNS Servers. 353-373 - Adam Portier, Henry Carter, Charles Lever:
Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild. 374-395 - Stefan Mehner, Hartmut König:
No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP. 396-414 - Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin:
DPX: Data-Plane eXtensions for SDN Security Service Instantiation. 415-437
Attack Mitigation
- Constantinos Diomedous, Elias Athanasopoulos:
Practical Password Hardening Based on TLS. 441-460 - Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. 461-481 - Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel:
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. 482-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.