Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Detection of intrusions and malware,...
~
DIMVA (Conference) (2025 :)
Linked to FindBook
Google Book
Amazon
博客來
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part I /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Detection of intrusions and malware, and vulnerability assessment/ edited by Manuel Egele ... [et al.].
Reminder of title:
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
remainder title:
DIMVA 2025
other author:
Egele, Manuel.
corporate name:
DIMVA (Conference)
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xv, 297 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Web Security. -- ScamFerret: Detecting Scam Websites Autonomously with Large Language Models. -- Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network. -- Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering. -- Poster: Generating the WEB-IDS23 Dataset. -- Vulnerability Detection. -- Sourcerer: channeling the void. -- CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection. -- SyzFroge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing. -- Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation. -- Side channels. -- Reverse-Engineering the Address Translation Caches. -- The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer. -- Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP. -- Poster: Extracting Cryptographic Keys from Windows Live Processes. -- Obfuscation. -- Experimental Study of Binary Diffing Resilience on Obfuscated Programs. -- Quantifying and Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement. -- Exploring the Potential of LLMs for Code Deobfuscation. -- Poster: All Right Then, (Don't) Keep Your Secrets: Exposing API Hashing in Malware.
Contained By:
Springer Nature eBook
Subject:
Intrusion detection systems (Computer security) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-97620-9
ISBN:
9783031976209
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part I /
Detection of intrusions and malware, and vulnerability assessment
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.Part I /[electronic resource] :DIMVA 2025edited by Manuel Egele ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xv, 297 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,157471611-3349 ;. - Lecture notes in computer science ;15747..
Web Security. -- ScamFerret: Detecting Scam Websites Autonomously with Large Language Models. -- Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network. -- Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering. -- Poster: Generating the WEB-IDS23 Dataset. -- Vulnerability Detection. -- Sourcerer: channeling the void. -- CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection. -- SyzFroge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing. -- Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation. -- Side channels. -- Reverse-Engineering the Address Translation Caches. -- The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer. -- Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP. -- Poster: Extracting Cryptographic Keys from Windows Live Processes. -- Obfuscation. -- Experimental Study of Binary Diffing Resilience on Obfuscated Programs. -- Quantifying and Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement. -- Exploring the Potential of LLMs for Code Deobfuscation. -- Poster: All Right Then, (Don't) Keep Your Secrets: Exposing API Hashing in Malware.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
ISBN: 9783031976209
Standard No.: 10.1007/978-3-031-97620-9doiSubjects--Topical Terms:
3135747
Intrusion detection systems (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25 / D55 2025
Dewey Class. No.: 005.8
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part I /
LDR
:03241nmm a2200349 a 4500
001
2413743
003
DE-He213
005
20250712073457.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031976209
$q
(electronic bk.)
020
$a
9783031976193
$q
(paper)
024
7
$a
10.1007/978-3-031-97620-9
$2
doi
035
$a
978-3-031-97620-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D55 2025
072
7
$a
UKN
$2
bicssc
072
7
$a
COM043000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D582 2025
111
2
$a
DIMVA (Conference)
$n
(22nd :
$d
2025 :
$c
Graz, Austria)
$3
3790000
245
1 0
$a
Detection of intrusions and malware, and vulnerability assessment
$h
[electronic resource] :
$b
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
$n
Part I /
$c
edited by Manuel Egele ... [et al.].
246
3
$a
DIMVA 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xv, 297 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15747
505
0
$a
Web Security. -- ScamFerret: Detecting Scam Websites Autonomously with Large Language Models. -- Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network. -- Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering. -- Poster: Generating the WEB-IDS23 Dataset. -- Vulnerability Detection. -- Sourcerer: channeling the void. -- CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection. -- SyzFroge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing. -- Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation. -- Side channels. -- Reverse-Engineering the Address Translation Caches. -- The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer. -- Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP. -- Poster: Extracting Cryptographic Keys from Windows Live Processes. -- Obfuscation. -- Experimental Study of Binary Diffing Resilience on Obfuscated Programs. -- Quantifying and Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement. -- Exploring the Potential of LLMs for Code Deobfuscation. -- Poster: All Right Then, (Don't) Keep Your Secrets: Exposing API Hashing in Malware.
520
$a
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
650
0
$a
Intrusion detection systems (Computer security)
$v
Congresses.
$3
3135747
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Crime Control and Security.
$3
3251653
650
2 4
$a
Quantum Physics.
$3
893952
700
1
$a
Egele, Manuel.
$3
3790001
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15747.
$3
3790002
856
4 0
$u
https://doi.org/10.1007/978-3-031-97620-9
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9519198
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 D55 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login