Detection of Intrusions and Malware, and Vulnerability Assessment
Springer International Publishing (Verlag)
978-3-030-22037-2 (ISBN)
The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.
Wild Wild Web.- Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions.- New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild.- Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting.- On the Perils of Leaking Referrers in Online Collaboration Services.- Cyber-Physical Systems.- Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.- Overshadow PLC to Detect Remote Control-Logic Injection Attacks.- A Security Evaluation of Industrial Radio Remote Controllers.- Understanding the Security of Traffic Signal Infrastructure.- Malware.- Practical Enclave Malware with Intel SGX.- How does Malware Use RDTSC? A Study on Operations Executed by Malware for CPU Cycle Measurement.- On Deception-Based Protection Against Cryptographic Ransomware.- PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware.- Software Security and Binary Analysis.- Memory Categorization: Separating Attacker-Controlled Data.- TypeMiner: Recovering Types in Binary Programs using Machine Learning.- SAFE: Self-Attentive Function Embeddings for Binary Similarity.- Triggerflow: Regression Testing by Advanced Execution Path Inspection.- Network Security.- Large-scale Analysis of Infrastructure-leaking DNS Servers.- Security In Plain TXT: Observing the Use of DNS TXT Records in the Wild.- No Need to Marry to Change Your Name!
Attacking Profinet IO Automation Networks Using DCP.- DPX: Data-Plane eXtensions for SDN Security Service Instantiation.- Attack Mitigation.- Practical Password Hardening based on TLS.- Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.- BinTrimmer: Towards Static Binary Debloating through Abstract Interpretation.
| Erscheinungsdatum | 07.06.2019 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XV, 504 p. 220 illus., 105 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 789 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Applications • Artificial Intelligence • Attack mitigation • authentication • binary analysis • computer crime • Computer Networks • computer operating systems • Computer Science • conference proceedings • cryptography • Data Security • Informatics • Internet • internet protocols • Intrusion Detection • Malware • Research • Security and Privacy • software and application security • Software engineering • Telecommunication networks • telecommunication traffic • World Wide Web |
| ISBN-10 | 3-030-22037-0 / 3030220370 |
| ISBN-13 | 978-3-030-22037-2 / 9783030220372 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich