default search action
DIMVA 2018: Saclay, France
- Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc:
Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings. Lecture Notes in Computer Science 10885, Springer 2018, ISBN 978-3-319-93410-5
Malware Analysis
- Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt:
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. 3-23 - Michael Brengel, Christian Rossow:
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps. 24-45 - Yanko Baychev, Leyla Bilge:
Spearphishing Malware: Do We Really Know the Unknown? 46-66
Mobile and Embedded Security
- Vincent Haupert, Dominik Christian Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller:
Honey, I Shrunk Your App Security: The State of Android App Hardening. 69-91 - Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi:
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. 92-113 - Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. 114-138
Attacks
- Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee:
Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats. 141-161 - Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow:
Evasive Malware via Identifier Implanting. 162-184 - Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz:
On the Weaknesses of Function Table Randomization. 185-207
Detection and Containment
- Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero:
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds. 211-233 - Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. 234-255 - Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin:
Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception. 256-278
Web and Browser Security
- Iskander Sánchez-Rola, Igor Santos:
Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking. 281-302 - Aurore Fass, Robert P. Krawczyk, Michael Backes, Ben Stock:
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. 303-325 - Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz:
Bytecode Corruption Attacks Are Real - And How to Defend Against Them. 326-348
Reverse Engineering
- Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero:
ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. 351-371 - Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet:
Symbolic Deobfuscation: From Virtualized Code Back to the Original. 372-392 - Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero:
Extended Abstract: Toward Systematically Exploring Antivirus Engines. 393-403
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.