Stop the war!
Остановите войну!
for scientists:
default search action
DIMVA 2020: Lisbon, Portugal
- Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12223, Springer 2020, ISBN 978-3-030-52682-5
Vulnerability Discovery and Analysis
- Emil Wåreus, Martin Hell:
Automated CPE Labeling of CVE Summaries with Machine Learning. 3-22 - Marc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier:
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. 23-43 - Herson Esquivel-Vargas, Marco Caselli, Geert Jan Laanstra, Andreas Peter:
Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective. 44-64
Attacks
- Pierre Ciholas, Jose Miguel Such, Angelos K. Marnerides, Benjamin Green, Jiajie Zhang, Utz Roedig:
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode. 67-88 - Zixuan Zhao, Yan Wang, Xiaorui Gong:
HAEPG: An Automatic Multi-hop Exploitation Generation Framework. 89-109 - En He, Daoyuan Wu, Robert H. Deng:
Understanding Android VoIP Security: A System-Level Vulnerability Assessment. 110-131
Web Security
- Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis:
Web Runner 2049: Evaluating Third-Party Anti-bot Services. 135-159 - Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis:
Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers. 160-170 - Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites. 171-191 - Marcus Botacin, Giovanni Bertão, Paulo L. de Geus, André Grégio, Christopher Kruegel, Giovanni Vigna:
On the Security of Application Installers and Online Software Repositories. 192-214
Detection and Containment
- Alexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert:
Distributed Heterogeneous N-Variant Execution. 217-237 - Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. 238-258 - Sadullah Canakci, Leila Delshadtehrani, Boyou Zhou, Ajay Joshi, Manuel Egele:
Efficient Context-Sensitive CFI Enforcement Through a Hardware Monitor. 259-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.