語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection of intrusions and malware,...
~
DIMVA (Conference) (2024 :)
FindBook
Google Book
Amazon
博客來
Detection of intrusions and malware, and vulnerability assessment = 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Detection of intrusions and malware, and vulnerability assessment/ edited by Federico Maggi ... [et al.].
其他題名:
21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /
其他題名:
DIMVA 2024
其他作者:
Maggi, Federico.
團體作者:
DIMVA (Conference)
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xiv, 558 p. :ill. (some col.), digital ;24 cm.
內容註:
Vulnerability Detection and Defense. -- Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries. -- S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More. -- Acoustic Side-Channel Attacks on a Computer Mouse. -- Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study. -- Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. -- Malware and Threats. -- Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks. -- Tarallo: Evading Behavioral Malware Detectors in the Problem Space. -- Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. -- Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. -- Listening between the Bits: Privacy Leaks in Audio Fingerprints. -- Mobile and Web Application Security. -- Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners. -- SandPuppy: Deep-state fuzzing guided by automatic detection of state-representative variables. -- Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps. -- PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. -- Knocking on Admin's Door: Protecting Critical Web Applications with Deception. -- AI for Security. -- Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. -- Inferring Recovery Steps from Cyber Threat Intelligence Reports. -- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. -- Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity. -- Extended Abstract: A Transfer Learning-based Training Approach for DGA Classification. -- Hardware and Firmware Security. -- Seum Spread: Discerning Security Flaws in IoT Firmware Via Call Sequence Semantics. -- Gluezilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. -- SmmPack: Obfuscation for SMM Modules. -- Presshammer: Rowhammer and Rowpress without Physical Address Information. -- Cyber Physical Systems and IoT. -- SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. -- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. -- Wireless Modulation Identification: filling the gap in IoT networks security audit. -- Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids.
Contained By:
Springer Nature eBook
標題:
Intrusion detection systems (Computer security) - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-64171-8
ISBN:
9783031641718
Detection of intrusions and malware, and vulnerability assessment = 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /
Detection of intrusions and malware, and vulnerability assessment
21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /[electronic resource] :DIMVA 2024edited by Federico Maggi ... [et al.]. - Cham :Springer Nature Switzerland :2024. - xiv, 558 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,148281611-3349 ;. - Lecture notes in computer science ;14828..
Vulnerability Detection and Defense. -- Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries. -- S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More. -- Acoustic Side-Channel Attacks on a Computer Mouse. -- Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study. -- Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. -- Malware and Threats. -- Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks. -- Tarallo: Evading Behavioral Malware Detectors in the Problem Space. -- Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. -- Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. -- Listening between the Bits: Privacy Leaks in Audio Fingerprints. -- Mobile and Web Application Security. -- Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners. -- SandPuppy: Deep-state fuzzing guided by automatic detection of state-representative variables. -- Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps. -- PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. -- Knocking on Admin's Door: Protecting Critical Web Applications with Deception. -- AI for Security. -- Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. -- Inferring Recovery Steps from Cyber Threat Intelligence Reports. -- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. -- Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity. -- Extended Abstract: A Transfer Learning-based Training Approach for DGA Classification. -- Hardware and Firmware Security. -- Seum Spread: Discerning Security Flaws in IoT Firmware Via Call Sequence Semantics. -- Gluezilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. -- SmmPack: Obfuscation for SMM Modules. -- Presshammer: Rowhammer and Rowpress without Physical Address Information. -- Cyber Physical Systems and IoT. -- SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. -- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. -- Wireless Modulation Identification: filling the gap in IoT networks security audit. -- Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids.
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.
ISBN: 9783031641718
Standard No.: 10.1007/978-3-031-64171-8doiSubjects--Topical Terms:
3135747
Intrusion detection systems (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25 / D55 2024
Dewey Class. No.: 005.8
Detection of intrusions and malware, and vulnerability assessment = 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /
LDR
:04387nmm a2200373 a 4500
001
2373907
003
DE-He213
005
20240711125251.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031641718
$q
(electronic bk.)
020
$a
9783031641701
$q
(paper)
024
7
$a
10.1007/978-3-031-64171-8
$2
doi
035
$a
978-3-031-64171-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D55 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D582 2024
111
2
$a
DIMVA (Conference)
$n
(21st :
$d
2024 :
$c
Lausanne, Switzerland)
$3
3722362
245
1 0
$a
Detection of intrusions and malware, and vulnerability assessment
$h
[electronic resource] :
$b
21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings /
$c
edited by Federico Maggi ... [et al.].
246
3
$a
DIMVA 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xiv, 558 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
14828
505
0
$a
Vulnerability Detection and Defense. -- Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries. -- S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More. -- Acoustic Side-Channel Attacks on a Computer Mouse. -- Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study. -- Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. -- Malware and Threats. -- Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks. -- Tarallo: Evading Behavioral Malware Detectors in the Problem Space. -- Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. -- Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. -- Listening between the Bits: Privacy Leaks in Audio Fingerprints. -- Mobile and Web Application Security. -- Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners. -- SandPuppy: Deep-state fuzzing guided by automatic detection of state-representative variables. -- Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps. -- PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. -- Knocking on Admin's Door: Protecting Critical Web Applications with Deception. -- AI for Security. -- Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. -- Inferring Recovery Steps from Cyber Threat Intelligence Reports. -- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. -- Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity. -- Extended Abstract: A Transfer Learning-based Training Approach for DGA Classification. -- Hardware and Firmware Security. -- Seum Spread: Discerning Security Flaws in IoT Firmware Via Call Sequence Semantics. -- Gluezilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. -- SmmPack: Obfuscation for SMM Modules. -- Presshammer: Rowhammer and Rowpress without Physical Address Information. -- Cyber Physical Systems and IoT. -- SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. -- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. -- Wireless Modulation Identification: filling the gap in IoT networks security audit. -- Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids.
520
$a
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.
650
0
$a
Intrusion detection systems (Computer security)
$v
Congresses.
$3
3135747
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Crime Control and Security.
$3
3251653
650
2 4
$a
Quantum Physics.
$3
893952
700
1
$a
Maggi, Federico.
$3
2156439
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14828.
$3
3722363
856
4 0
$u
https://doi.org/10.1007/978-3-031-64171-8
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9494356
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 D55 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入