The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "DIMVA"( http://dblp.L3S.de/Venues/DIMVA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/dimva

Publication years (Num. hits)
2004 (15) 2005 (15) 2006-2007 (27) 2008 (15) 2009-2010 (27) 2011-2012 (28) 2013-2014 (29) 2015 (18) 2016 (22) 2017 (19) 2018 (19) 2019 (24) 2020-2021 (34) 2022-2023 (26)
Publication types (Num. hits)
inproceedings(298) proceedings(20)
Venues (Conferences, Journals, ...)
DIMVA(318)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 50 occurrences of 39 keywords

Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Linus Hafkemeyer, Jerre Starink, Andrea Continella Divak: Non-invasive Characterization of Out-of-Bounds Write Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Marco Balduzzi, Francesco Sortino, Fabio Castello, Leandro Pierguidi A Security Analysis of CNC Machines in Industry 4.0. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kevin van Liebergen, Juan Caballero, Platon Kotzias, Chris Gates A Deep Dive into the VirusTotal File Feed. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Alessandro Bertani, Marco Bonelli, Lorenzo Binosi, Michele Carminati, Stefano Zanero, Mario Polino Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth 0001 MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Alessandro Erba 0001, Nils Ole Tippenhauer White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1René Helmke, Johannes vom Dorp Extended Abstract: Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Anni Peng, Dongliang Fang, Wei Zhou 0026, Erik van der Kouwe, Yin Li, Yuqing Zhang 0001 CEFI: Command Execution Flow Integrity for Embedded Devices. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Daniel Gruss, Federico Maggi, Mathias Fischer 0001, Michele Carminati (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth 0001 Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Fangyi Yu, Miguel Vargas Martin Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yunsen Lei, Julian P. Lanson, Craig A. Shue, Timothy W. Wood Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Marina Botvinnik, Tomer Laor, Thomas Rokicki, Clémentine Maurice, Yossi Oren The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Bhupendra Acharya, Phani Vadrevu A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun 0001, Qi Li 0002 Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1William Blair, William K. Robertson, Manuel Egele MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Francesco Meloni, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mizuki Kondo, Rui Tanabe, Natsuo Shintani, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shay Sakazi, Yuval Elovici, Asaf Shabtai Prioritizing Antivirus Alerts on Internal Enterprise Machines. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Laurens D'hooge, Miel Verkerken, Bruno Volckaert, Tim Wauters, Filip De Turck Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Dipanjan Das 0002, Priyanka Bose, Aravind Machiry, Sebastiano Mariani, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel Hybrid Pruning: Towards Precise Pointer and Taint Analysis. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lorenzo Cavallaro, Daniel Gruss, Giancarlo Pellegrino, Giorgio Giacinto (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Joschua Schilling, Tilo Müller VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Michael Wang, Alex Interrante-Grant, Ryan Whelan, Tim Leek COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lorenz Hetterich, Michael Schwarz 0001 Branch Different - Spectre Attacks on Apple Silicon. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Michele Benolli, Seyed Ali Mirheidari, Elham Arshad, Bruno Crispo The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Guillaume Didier 0001, Clémentine Maurice Calibration Done Right: Noiseless Flush+Flush Attacks. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jan Wichelmann, Sebastian Berndt 0001, Claudius Pott, Thomas Eisenbarth 0001 Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Florian Quinkert, Dennis Tatang, Thorsten Holz Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Karthika Subramani, Roberto Perdisci, Maria Konte Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Omid Setayeshfar, Junghwan John Rhee, Chung Hwan Kim, Kyu Hyung Lee Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yu-Jye Tung, Ian G. Harris Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates from Naturally Occurring Invariants. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Dennis Tatang, Robin Flume, Thorsten Holz Extended Abstract: A First Large-Scale Analysis on Usage of MTA-STS. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wei Huang 0027, Shengjie Xu, Yueqiang Cheng, David Lie Aion Attacks: Manipulating Software Timers in Trusted Execution Environment. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lizzy Tengana, Jesus Solano, Alejandra Castelblanco, Esteban Rivera, Christian Lopez, Martín Ochoa Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Tommaso Innocenti, Seyed Ali Mirheidari, Amin Kharraz, Bruno Crispo, Engin Kirda You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves 0001 (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chuhong Yuan, Dong Du 0003, Haibo Chen 0001 Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Antonin Durey, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Florian Quinkert, Martin Degeling, Thorsten Holz Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1ElMouatez Billah Karbab, Mourad Debbabi PetaDroid: Adaptive Android Malware Detection Using Deep Learning. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ivica Nikolic, Radu Mantu, Shiqi Shen, Prateek Saxena Refined Grey-Box Fuzzing with Sivo. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ahmed Abdelraoof, Benjamin Taubmann, Thomas Dangl, Hans P. Reiser Introspect Virtual Machines Like It Is the Linux Kernel! Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier 0001 Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Takashi Koide, Daiki Chiba 0001, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1En He, Daoyuan Wu, Robert H. Deng Understanding Android VoIP Security: A System-Level Vulnerability Assessment. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Herson Esquivel-Vargas, Marco Caselli, Geert Jan Laanstra, Andreas Peter Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves 0001 (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Pierre Ciholas, Jose Miguel Such, Angelos K. Marnerides, Benjamin Green 0001, Jiajie Zhang, Utz Roedig Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zixuan Zhao, Yan Wang, Xiaorui Gong HAEPG: An Automatic Multi-hop Exploitation Generation Framework. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis Web Runner 2049: Evaluating Third-Party Anti-bot Services. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marcus Botacin, Giovanni Bertão, Paulo L. de Geus, André Grégio, Christopher Kruegel, Giovanni Vigna On the Security of Application Installers and Online Software Repositories. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Emil Wåreus, Martin Hell Automated CPE Labeling of CVE Summaries with Machine Learning. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sadullah Canakci, Leila Delshadtehrani, Boyou Zhou, Ajay Joshi, Manuel Egele Efficient Context-Sensitive CFI Enforcement Through a Hardware Monitor. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert Distributed Heterogeneous N-Variant Execution. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aidan Beggs, Alexandros Kapravelos Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yoshihiro Oyama How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed 0001 Overshadow PLC to Detect Remote Control-Logic Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra On Deception-Based Protection Against Cryptographic Ransomware. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Adam Portier, Henry Carter, Charles Lever Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhenyu Ning, Fengwei Zhang, Stephen M. Remias Understanding the Security of Traffic Signal Infrastructure. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michael Schwarz 0001, Samuel Weiser, Daniel Gruss Practical Enclave Malware with Intel SGX. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nilo Redini, Ruoyu Wang 0001, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Constantinos Diomedous, Elias Athanasopoulos Practical Password Hardening Based on TLS. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni SAFE: Self-Attentive Function Embeddings for Binary Similarity. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck TypeMiner: Recovering Types in Binary Programs Using Machine Learning. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin DPX: Data-Plane eXtensions for SDN Security Service Instantiation. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Beliz Kaleli, Manuel Egele, Gianluca Stringhini On the Perils of Leaking Referrers in Online Collaboration Services. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dennis Tatang, Carl Richard Theodor Schneider, Thorsten Holz Large-Scale Analysis of Infrastructure-Leaking DNS Servers. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus Memory Categorization: Separating Attacker-Controlled Data. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stefan Mehner, Hartmut König No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley Triggerflow: Regression Testing by Advanced Execution Path Inspection. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler A Security Evaluation of Industrial Radio Remote Controllers. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz Bytecode Corruption Attacks Are Real - And How to Defend Against Them. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vincent Haupert, Dominik Christian Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller Honey, I Shrunk Your App Security: The State of Android App Hardening. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz On the Weaknesses of Function Table Randomization. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet Symbolic Deobfuscation: From Virtualized Code Back to the Original. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow Evasive Malware via Identifier Implanting. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iskander Sánchez-Rola, Igor Santos Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang 0001, Aiman Hanna BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael Brengel, Christian Rossow MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yanko Baychev, Leyla Bilge Spearphishing Malware: Do We Really Know the Unknown? Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero Extended Abstract: Toward Systematically Exploring Antivirus Engines. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 318 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license