Detection of Intrusions and Malware, and Vulnerability Assessment 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings /
Detection of Intrusions and Malware, and Vulnerability Assessment 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / [electronic resource] :
edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves.
- 1st ed. 2020.
- XII, 281 p. 234 illus., 60 illus. in color. online resource.
- Security and Cryptology, 12223 2946-1863 ; .
- Security and Cryptology, 12223 .
Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.
9783030526832
10.1007/978-3-030-52683-2 doi
Data protection.
Computer networks .
Computer engineering.
Cryptography.
Data encryption (Computer science).
Software engineering.
Computers--Law and legislation.
Information technology--Law and legislation.
Data and Information Security.
Computer Communication Networks.
Computer Engineering and Networks.
Cryptology.
Software Engineering.
Legal Aspects of Computing.
QA76.9.A25
005.8
Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.
9783030526832
10.1007/978-3-030-52683-2 doi
Data protection.
Computer networks .
Computer engineering.
Cryptography.
Data encryption (Computer science).
Software engineering.
Computers--Law and legislation.
Information technology--Law and legislation.
Data and Information Security.
Computer Communication Networks.
Computer Engineering and Networks.
Cryptology.
Software Engineering.
Legal Aspects of Computing.
QA76.9.A25
005.8