default search action
DIMVA 2012: Heraklion, Crete, Greece
- Ulrich Flegel, Evangelos P. Markatos, William K. Robertson:
Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7591, Springer 2013, ISBN 978-3-642-37299-5
Malware I
- Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu:
Using File Relationships in Malware Classification. 1-20 - Patrick Stewin, Iurii Bystrov:
Understanding DMA Malware. 21-41 - Christian Rossow, Christian J. Dietrich, Herbert Bos:
Large-Scale Analysis of Malware Downloaders. 42-61
Mobile Security
- Steve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song:
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. 62-81 - Min Zheng, Patrick P. C. Lee, John C. S. Lui:
ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. 82-101
Malware II
- Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna:
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. 102-122 - Yongzheng Wu, Roland H. C. Yap:
Experiments with Malware Visualization. 123-133 - André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna:
Tracking Memory Writes for Malware Classification and Code Reuse Identification. 134-143
Secure Design
- Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos:
System-Level Support for Intrusion Recovery. 144-163 - Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou:
NetGator: Malware Detection Using Program Interactive Challenges. 164-183 - Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz:
SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines. 184-203
IDS
- Thomas Schreck, Stefan Berger, Jan Göbel:
BISSAM: Automatic Vulnerability Identification of Office Documents. 204-213 - Karel Bartos, Martin Rehák, Michal Svoboda:
Self-organized Collaboration of Distributed IDS Sensors. 214-231 - Elias Raftopoulos, Matthias Egli, Xenofontas A. Dimitropoulos:
Shedding Light on Log Correlation in Network Forensics Analysis. 232-241
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.