Detection of Intrusions and Malware, and Vulnerability Assessment
Springer International Publishing (Verlag)
978-3-030-52682-5 (ISBN)
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.*
The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment.
*The conference was held virtually due to the COVID-19 pandemic.
Vulnerability Discovery and Analysis.- Automated CPE labeling of CVE summaries with Machine Learning.- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective.- Attacks.- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode.- HAEPG: An Automatic Multi-hop Exploitation Generation Framework.- Understanding Android VoIP Security: A System-level Vulnerability Assessment.- Web Security.- Web Runner 2049: Evaluating Third-Party Anti-bot Services.- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers.- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.- On the Security of Application Installers & Online Software Repositories.- Detection and Containment.- Distributed Heterogeneous N-Variant Execution.- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data.- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.
| Erscheinungsdatum | 09.07.2020 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 281 p. 234 illus., 60 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 456 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Applications • authentication • computer crime • Computer Hardware • Computer Networks • computer programming • Computer Science • conference proceedings • cryptography • Data Security • Human-Computer Interaction (HCI) • Informatics • Intrusion Detection • Malware • Network Protocols • Network Security • parallel processing systems • Research • Signal Processing • Software Design • Telecommunication Systems • User Interfaces |
| ISBN-10 | 3-030-52682-8 / 3030526828 |
| ISBN-13 | 978-3-030-52682-5 / 9783030526825 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich