Search dblp for Publications

export results for "toc:db/conf/dimva/dimva2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dimva/AndriesseB14,
  author    = {Dennis Andriesse and
               Herbert Bos},
  title     = {Instruction-Level Steganography for Covert Trigger-Based Malware -
               (Extended Abstract)},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {41--50},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/BaraboschEG14,
  author    = {Thomas Barabosch and
               Sebastian Eschweiler and
               Elmar Gerhards{-}Padilla},
  title     = {Bee Master: Detecting Host-Based Code Injection Attacks},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {235--254},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/GiuffridaMCB14,
  author    = {Cristiano Giuffrida and
               Kamil Majdanik and
               Mauro Conti and
               Herbert Bos},
  title     = {I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced
               Keystroke Dynamics},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {92--111},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/KurmusDK14,
  author    = {Anil Kurmus and
               Sergej Dechand and
               R{\"{u}}diger Kapitza},
  title     = {Quantifiable Run-Time Kernel Attack Surface Reduction},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {212--234},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/LindorferVSNAMPZI14,
  author    = {Martina Lindorfer and
               Stamatis Volanis and
               Alessandro Sisto and
               Matthias Neugschwandtner and
               Elias Athanasopoulos and
               Federico Maggi and
               Christian Platzer and
               Stefano Zanero and
               Sotiris Ioannidis},
  title     = {AndRadar: Fast Discovery of Android Applications in Alternative Markets},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {51--71},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/MaioKSKV14,
  author    = {Giancarlo De Maio and
               Alexandros Kapravelos and
               Yan Shoshitaishvili and
               Christopher Kruegel and
               Giovanni Vigna},
  title     = {PExy: The Other Side of Exploit Kits},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {132--151},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/MohaisenA14,
  author    = {Aziz Mohaisen and
               Omar Alrawi},
  title     = {AV-Meter: An Evaluation of Antivirus Scans and Labels},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {112--131},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/RietzVSK14,
  author    = {Ren{\'{e}} Rietz and
               Michael Vogel and
               Franka Schuster and
               Hartmut K{\"{o}}nig},
  title     = {Parallelization of Network Intrusion Detection Systems under Attack
               Conditions},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {172--191},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/RuttenbergMKNHLLP14,
  author    = {Brian E. Ruttenberg and
               Craig Miles and
               Lee Kellogg and
               Vivek Notani and
               Michael Howard and
               Charles LeDoux and
               Arun Lakhotia and
               Avi Pfeffer},
  title     = {Identifying Shared Software Components to Support Malware Forensics},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {21--40},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/SchiavoniMCZ14,
  author    = {Stefano Schiavoni and
               Federico Maggi and
               Lorenzo Cavallaro and
               Stefano Zanero},
  title     = {Phoenix: DGA-Based Botnet Tracking and Intelligence},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {192--211},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/SlowinskaHBBB14,
  author    = {Asia Slowinska and
               Istv{\'{a}}n Haller and
               Andrei Bacs and
               Silviu Baranga and
               Herbert Bos},
  title     = {Data Structure Archaeology: Scrape Away the Dirt and Glue Back the
               Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {1--20},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/WangSL14,
  author    = {Tielei Wang and
               Chengyu Song and
               Wenke Lee},
  title     = {Diagnosis and Emergency Patch Generation for Integer Overflow Exploits},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {255--275},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/WestM14,
  author    = {Andrew G. West and
               Aziz Mohaisen},
  title     = {Metadata-Driven Threat Classification of Network Endpoints Appearing
               in Malware},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {152--171},
  publisher = {Springer},
  year      = {2014}
}
@inproceedings{DBLP:conf/dimva/ZhangD14,
  author    = {Xiao Zhang and
               Wenliang Du},
  title     = {Attacks on Android Clipboard},
  booktitle = {{DIMVA}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  pages     = {72--91},
  publisher = {Springer},
  year      = {2014}
}
@proceedings{DBLP:conf/dimva/2014,
  editor    = {Sven Dietrich},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
               2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  publisher = {Springer},
  year      = {2014}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics