


default search action
DIMVA 2019: Gothenburg, Sweden
- Roberto Perdisci

, Clémentine Maurice
, Giorgio Giacinto, Magnus Almgren:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Lecture Notes in Computer Science 11543, Springer 2019, ISBN 978-3-030-22037-2
Wild Wild Web
- Aidan Beggs, Alexandros Kapravelos:

Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions. 3-22 - Marius Musch, Christian Wressnegger, Martin Johns

, Konrad Rieck:
New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. 23-42 - Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis:

Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. 43-66 - Beliz Kaleli, Manuel Egele, Gianluca Stringhini:

On the Perils of Leaking Referrers in Online Collaboration Services. 67-85
Cyber-Physical Systems
- Olivier Cabana, Amr M. Youssef, Mourad Debbabi

, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. 89-108 - Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed

:
Overshadow PLC to Detect Remote Control-Logic Injection Attacks. 109-132 - Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler:

A Security Evaluation of Industrial Radio Remote Controllers. 133-153 - Zhenyu Ning, Fengwei Zhang, Stephen M. Remias

:
Understanding the Security of Traffic Signal Infrastructure. 154-174
Malware
- Michael Schwarz, Samuel Weiser, Daniel Gruss

:
Practical Enclave Malware with Intel SGX. 177-196 - Yoshihiro Oyama:

How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. 197-218 - Ziya Alper Genç

, Gabriele Lenzini
, Daniele Sgandurra
:
On Deception-Based Protection Against Cryptographic Ransomware. 219-239 - Denis Ugarte, Davide Maiorca

, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. 240-259
Software Security and Binary Analysis
- Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus:

Memory Categorization: Separating Attacker-Controlled Data. 263-287 - Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck:

TypeMiner: Recovering Types in Binary Programs Using Machine Learning. 288-308 - Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni

:
SAFE: Self-Attentive Function Embeddings for Binary Similarity. 309-329 - Iaroslav Gridin

, Cesar Pereida García
, Nicola Tuveri
, Billy Bob Brumley
:
Triggerflow: Regression Testing by Advanced Execution Path Inspection. 330-350
Network Security
- Dennis Tatang, Carl Richard Theodor Schneider

, Thorsten Holz:
Large-Scale Analysis of Infrastructure-Leaking DNS Servers. 353-373 - Adam Portier, Henry Carter

, Charles Lever:
Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild. 374-395 - Stefan Mehner, Hartmut König:

No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP. 396-414 - Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin:

DPX: Data-Plane eXtensions for SDN Security Service Instantiation. 415-437
Attack Mitigation
- Constantinos Diomedous, Elias Athanasopoulos:

Practical Password Hardening Based on TLS. 441-460 - Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:

Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. 461-481 - Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel:

BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. 482-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














