Detection of intrusions and malware,...
DIMVA (Conference) (2024 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Detection of intrusions and malware, and vulnerability assessment = 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Detection of intrusions and malware, and vulnerability assessment/ edited by Federico Maggi ... [et al.].
    Reminder of title: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /
    remainder title: DIMVA 2024
    other author: Maggi, Federico.
    corporate name: DIMVA (Conference)
    Published: Cham :Springer Nature Switzerland : : 2024.,
    Description: xiv, 558 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Vulnerability Detection and Defense. -- Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries. -- S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More. -- Acoustic Side-Channel Attacks on a Computer Mouse. -- Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study. -- Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. -- Malware and Threats. -- Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks. -- Tarallo: Evading Behavioral Malware Detectors in the Problem Space. -- Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. -- Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. -- Listening between the Bits: Privacy Leaks in Audio Fingerprints. -- Mobile and Web Application Security. -- Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners. -- SandPuppy: Deep-state fuzzing guided by automatic detection of state-representative variables. -- Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps. -- PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. -- Knocking on Admin's Door: Protecting Critical Web Applications with Deception. -- AI for Security. -- Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. -- Inferring Recovery Steps from Cyber Threat Intelligence Reports. -- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. -- Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity. -- Extended Abstract: A Transfer Learning-based Training Approach for DGA Classification. -- Hardware and Firmware Security. -- Seum Spread: Discerning Security Flaws in IoT Firmware Via Call Sequence Semantics. -- Gluezilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. -- SmmPack: Obfuscation for SMM Modules. -- Presshammer: Rowhammer and Rowpress without Physical Address Information. -- Cyber Physical Systems and IoT. -- SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. -- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. -- Wireless Modulation Identification: filling the gap in IoT networks security audit. -- Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids.
    Contained By: Springer Nature eBook
    Subject: Intrusion detection systems (Computer security) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-64171-8
    ISBN: 9783031641718
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9494356 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 D55 2024 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login