|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 50 occurrences of 39 keywords
|
|
|
Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan |
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 234-255, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Aurore Fass, Robert P. Krawczyk, Michael Backes 0001, Ben Stock |
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 303-325, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero |
ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 351-371, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Boris Zadov, Yuval Elovici |
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 161-184, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Paria Shirani, Lingyu Wang 0001, Mourad Debbabi |
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 301-324, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla |
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 209-229, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert 0001 |
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 119-138, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yizheng Chen 0001, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon |
Measuring Network Reputation in the Ad-Bidding Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 388-409, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pavlos Lamprakis, Ruggiero Dargenio, David Gugelmann, Vincent Lenders, Markus Happe, Laurent Vanbever |
Unsupervised Detection of APT C&C Channels using Web Request Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 366-387, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lingguang Lei, Jianhua Sun, Kun Sun 0001, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li 0002 |
SPEAKER: Split-Phase Execution of Application Containers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 230-251, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Heen, Christoph Neumann 0001 |
On the Privacy Impacts of Publicly Leaked Password Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 347-365, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero |
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 185-206, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michalis Polychronakis, Michael Meier 0001 (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![Springer, 978-3-319-60875-4 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shruti Tople, Prateek Saxena |
On the Trade-Offs in Oblivious Execution Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 25-47, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero |
Measuring and Defeating Anti-Instrumentation-Equipped Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 73-96, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sam L. Thomas, Flavio D. Garcia, Tom Chothia |
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 279-300, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard |
Malware Guard Extension: Using SGX to Conceal Cache Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 3-24, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Deqing Zou, Hanchao Qi, Zhen Li 0027, Song Wu 0001, Hai Jin 0001, Guozhong Sun, Sujuan Wang, Yuyi Zhong |
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 325-344, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou |
Deep Ground Truth Analysis of Current Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 252-276, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua |
DynODet: Detecting Dynamic Obfuscation in Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 97-118, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis |
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 48-69, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mark Luchs, Christian Doerr |
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 141-160, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert 0001 |
Adaptive Semantics-Aware Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 419-439, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Gruss, Clémentine Maurice, Klaus Wagner 0001, Stefan Mangard |
Flush+Flush: A Fast and Stealthy Cache Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 279-299, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sergio Pastrana, Juan E. Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López |
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 58-77, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Konstantin Böttinger, Claudia Eckert 0001 |
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 25-34, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hupperich, Henry Hosseini, Thorsten Holz |
Leveraging Sensor Fingerprinting for Mobile Device Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 377-396, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Kintis, Yacin Nadji, David Dagon, Michael Farrell, Manos Antonakakis |
Understanding the Privacy Implications of ECS - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 343-353, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti |
Subverting Operating System Properties Through Evolutionary DKOM Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 3-24, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yizheng Chen 0001, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell |
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 231-254, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wanpeng Li, Chris J. Mitchell |
Analysing the Security of Google's Implementation of OpenID Connect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 357-376, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Gruss, Clémentine Maurice, Stefan Mangard |
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 300-321, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas |
RAMBO: Run-Time Packer Analysis with Multiple Branch Observation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 186-206, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon |
On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 142-162, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Comprehensive Analysis and Detection of Flash-Based Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 101-121, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz 0001, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu 0002, George Yiu, Anthony D. Joseph, J. D. Tygar |
Reviewer Integration and Performance Measurement for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 122-141, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andre Pawlowski, Moritz Contag, Thorsten Holz |
Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 165-185, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wenyi Huang, Jack W. Stokes |
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 399-418, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz |
Detile: Fine-Grained Information Leak Detection in Script Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 322-342, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert |
Towards Vulnerability Discovery Using Staged Program Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 78-97, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Brengel, Michael Backes 0001, Christian Rossow |
Detecting Hardware-Assisted Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 207-227, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jeff H. Perkins, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, Martin C. Rinard |
AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 37-57, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![Springer, 978-3-319-40666-4 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Flavio Toffalini, Maurizio Abbà, Damiano Carra, Davide Balzarotti |
Google Dorks: Analysis, Creation, and New Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 255-275, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Strohmeier, Vincent Lenders, Ivan Martinovic |
Intrusion Detection for Airborne Communication Using PHY-Layer Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 67-77, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito |
Controlled Data Sharing for Collaborative Predictive Blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 327-349, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Stringhini, Olivier Thonnard |
That Ain't You: Blocking Spearphishing Through Behavioral Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 78-97, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Han, Nizar Kheir, Davide Balzarotti |
The Role of Cloud Services in Malicious Software: Trends and Insights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 187-204, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Payer, Antonio Barresi, Thomas R. Gross |
Fine-Grained Control-Flow Integrity Through Binary Hardening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 144-164, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | JingMin Huang, Gianluca Stringhini, Peng Yong |
Quit Playing Games with My Heart: Understanding Online Dating Scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 216-236, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld |
May I? - Content Security Policy Endorsement for Browser Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 261-281, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Wüchner, Martín Ochoa, Alexander Pretschner |
Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 98-118, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis |
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 165-184, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Clémentine Maurice, Christoph Neumann 0001, Olivier Heen, Aurélien Francillon |
C5: Cross-Cores Cache Covert Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 46-64, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna |
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 282-303, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero |
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 121-143, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![Springer, 978-3-319-20549-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler |
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 239-260, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Yang 0003, Zhongmin Cai, Weixuan Mao, Zhihai Yang |
Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 307-326, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos |
"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 25-45, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | An Wang 0002, Aziz Mohaisen, Wentao Chang, Songqing Chen |
Capturing DDoS Attack Dynamics Behind the Scenes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 205-215, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda |
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 3-24, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Zhang, Wenliang Du |
Attacks on Android Clipboard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 72-91, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Cristiano Giuffrida, Kamil Majdanik, Mauro Conti, Herbert Bos |
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 92-111, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero |
Phoenix: DGA-Based Botnet Tracking and Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 192-211, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martina Lindorfer, Stamatis Volanis, Alessandro Sisto 0001, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis |
AndRadar: Fast Discovery of Android Applications in Alternative Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 51-71, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aziz Mohaisen, Omar Alrawi |
AV-Meter: An Evaluation of Antivirus Scans and Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 112-131, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sven Dietrich (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![Springer, 978-3-319-08508-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tielei Wang, Chengyu Song, Wenke Lee |
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 255-275, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brian E. Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux, Arun Lakhotia, Avi Pfeffer |
Identifying Shared Software Components to Support Malware Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 21-40, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anil Kurmus, Sergej Dechand, Rüdiger Kapitza |
Quantifiable Run-Time Kernel Attack Surface Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 212-234, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
PExy: The Other Side of Exploit Kits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 132-151, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Andriesse, Herbert Bos |
Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 41-50, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla |
Bee Master: Detecting Host-Based Code Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 235-254, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | René Rietz, Michael Vogel, Franka Schuster, Hartmut König |
Parallelization of Network Intrusion Detection Systems under Attack Conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 172-191, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andrew G. West, Aziz Mohaisen |
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 152-171, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Asia Slowinska, István Haller, Andrei Bacs, Silviu Baranga, Herbert Bos |
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 1-20, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guanhua Yan, Nathan Brown, Deguang Kong |
Exploring Discriminatory Features for Automated Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 41-61, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Johns |
PreparedJS: Secure Script-Templates for JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 102-121, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda |
Securing Legacy Firefox Extensions with SENTINEL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 122-138, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nick Nikiforakis, Frank Piessens, Wouter Joosen |
HeapSentry: Kernel-Assisted Protection against Heap Overflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 177-196, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert |
SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 150-159, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Nappa, M. Zubair Rafique, Juan Caballero |
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 1-20, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![Springer, 978-3-642-39234-4 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Rossow, Christian J. Dietrich |
ProVeX: Detecting Botnets with Encrypted Command and Control Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 21-40, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li 0001 |
PeerRush: Mining for Unwanted P2P Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 62-82, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Felix Schuster, Stefan Rüster, Thorsten Holz |
Preventing Backdoors in Server Applications with a Separated Software Architecture - (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 197-206, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gen Lu, Saumya K. Debray |
Weaknesses in Defenses against Web-Borne Malware - (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 139-149, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Flegel, Evangelos P. Markatos, William K. Robertson (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![Springer, 978-3-642-37299-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Paul 0003, Franka Schuster, Hartmut König |
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 160-176, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yehonatan Cohen, Daniel Gordon, Danny Hendler |
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 83-101, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Karel Bartos, Martin Rehák, Michal Svoboda |
Self-organized Collaboration of Distributed IDS Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 214-231, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna |
Tracking Memory Writes for Malware Classification and Code Reuse Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 134-143, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna |
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 102-122, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos |
System-Level Support for Intrusion Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 144-163, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Steve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song |
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 62-81, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Elias Raftopoulos, Matthias Egli, Xenofontas A. Dimitropoulos |
Shedding Light on Log Correlation in Network Forensics Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 232-241, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian Rossow, Christian J. Dietrich, Herbert Bos |
Large-Scale Analysis of Malware Downloaders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 42-61, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Brian Schulte, Haris Andrianakis, Kun Sun 0001, Angelos Stavrou |
NetGator: Malware Detection Using Program Interactive Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 164-183, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yongzheng Wu, Roland H. C. Yap |
Experiments with Malware Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 123-133, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 318 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ >>] |
|