找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 9th International Co Ulrich Flegel,Evangelos Markatos,William Robertson

[复制链接]
查看: 37264|回复: 49
发表于 2025-3-21 19:13:46 | 显示全部楼层 |阅读模式
书目名称Detection of Intrusions and Malware, and Vulnerability Assessment
副标题9th International Co
编辑Ulrich Flegel,Evangelos Markatos,William Robertson
视频video
概述State-of-the-art research.Fast-track conference proceedings.Unique visibility
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 9th International Co Ulrich Flegel,Evangelos Markatos,William Robertson
描述This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).
出版日期Conference proceedings 2013
关键词code reuse; intrusion recovery; malware classification; mobile devices; network forensics
版次1
doihttps://doi.org/10.1007/978-3-642-37300-8
isbn_softcover978-3-642-37299-5
isbn_ebook978-3-642-37300-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2013
The information of publication is updating

书目名称Detection of Intrusions and Malware, and Vulnerability Assessment影响因子(影响力)




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment影响因子(影响力)学科排名




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment网络公开度




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment网络公开度学科排名




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment被引频次




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment被引频次学科排名




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment年度引用




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment年度引用学科排名




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment读者反馈




书目名称Detection of Intrusions and Malware, and Vulnerability Assessment读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:30:03 | 显示全部楼层
发表于 2025-3-22 03:48:59 | 显示全部楼层
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applicationsiracy, or are instances of known malware. We evaluate our system using more than 58,000 Android applications and demonstrate that our system scales well and is effective. Our results show that Juxtapp is able to detect: 1) . applications with confirmed buggy code reuse that can lead to serious vulne
发表于 2025-3-22 05:01:21 | 显示全部楼层
ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus SystemsWe demonstrate the efficacy of ADAM using 222 Android malware samples that we collected in the wild. Using ADAM, we generate different variants based on our collected malware samples, and evaluate the detection of these variants against commercial anti-virus systems.
发表于 2025-3-22 09:13:01 | 显示全部楼层
A Static, Packer-Agnostic Filter to Detect Similar Malware Samplesthe costly task of preliminary unpacking, but instead, operates directly on packed code. Our approach exploits the fact that current packers use compression and weak encryption schemes that do not break, in the packed versions, all the similarities existing between the original versions of two progr
发表于 2025-3-22 13:58:13 | 显示全部楼层
Tracking Memory Writes for Malware Classification and Code Reuse Identification validate our proposed techniques, we analyzed 16,248 malware samples. We found that our techniques produce clusters with high accuracy, as well as interesting cases of code reuse among malicious programs.
发表于 2025-3-22 17:09:28 | 显示全部楼层
NetGator: Malware Detection Using Program Interactive Challengese to correctly solve and respond to the challenge, NetGator flags the flow as potential malware. Our approach is seamless and requires no interaction from the user and no changes on the commodity application software. NetGator introduces a minimal traffic latency (0.35 seconds on average) to normal
发表于 2025-3-22 22:47:45 | 显示全部楼层
: Secure Smartphone-Assisted Login on Compromised Machines point of this proxy is that it can be accessed from untrusted or even compromised machines via a WiFi or a USB connection, so as to enable secure logins, while at the same time preventing the attacker (who is controlling the machine) from seeing crucial data like user credentials or browser cookies
发表于 2025-3-23 05:15:00 | 显示全部楼层
发表于 2025-3-23 07:56:01 | 显示全部楼层
Detection of Intrusions and Malware, and Vulnerability Assessment9th International Co
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 03:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表