International Conference on Detection of intrusions and malware, and vulnerability assessment最新文献

筛选
英文 中文
"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them “漂亮的靴子!”-对Bootkits的大规模分析和阻止它们的新方法
Bernhard Grill, Andrei Bacs, Christian Platzer, H. Bos
{"title":"\"Nice Boots!\" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them","authors":"Bernhard Grill, Andrei Bacs, Christian Platzer, H. Bos","doi":"10.1007/978-3-319-20550-2_2","DOIUrl":"https://doi.org/10.1007/978-3-319-20550-2_2","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127237309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
May I? - Content Security Policy Endorsement for Browser Extensions 我可以吗?-浏览器扩展的内容安全策略背书
Daniel Hausknecht, Jonas Magazinius, A. Sabelfeld
{"title":"May I? - Content Security Policy Endorsement for Browser Extensions","authors":"Daniel Hausknecht, Jonas Magazinius, A. Sabelfeld","doi":"10.1007/978-3-319-20550-2_14","DOIUrl":"https://doi.org/10.1007/978-3-319-20550-2_14","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Controlled Data Sharing for Collaborative Predictive Blacklisting 基于协同预测黑名单的受控数据共享
Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito
{"title":"Controlled Data Sharing for Collaborative Predictive Blacklisting","authors":"Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito","doi":"10.1007/978-3-319-20550-2_17","DOIUrl":"https://doi.org/10.1007/978-3-319-20550-2_17","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Parallelization of Network Intrusion Detection Systems under Attack Conditions 攻击条件下网络入侵检测系统的并行化
René Rietz, Michael Vogel, Franka Schuster, H. König
{"title":"Parallelization of Network Intrusion Detection Systems under Attack Conditions","authors":"René Rietz, Michael Vogel, Franka Schuster, H. König","doi":"10.1007/978-3-319-08509-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-08509-8_10","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits 整数溢出漏洞的诊断和紧急补丁生成
Tielei Wang, Chengyu Song, Wenke Lee
{"title":"Diagnosis and Emergency Patch Generation for Integer Overflow Exploits","authors":"Tielei Wang, Chengyu Song, Wenke Lee","doi":"10.1007/978-3-319-08509-8_14","DOIUrl":"https://doi.org/10.1007/978-3-319-08509-8_14","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
PExy: The Other Side of Exploit Kits PExy:漏洞利用工具包的另一面
G. Maio, A. Kapravelos, Yan Shoshitaishvili, Christopher Krügel, G. Vigna
{"title":"PExy: The Other Side of Exploit Kits","authors":"G. Maio, A. Kapravelos, Yan Shoshitaishvili, Christopher Krügel, G. Vigna","doi":"10.1007/978-3-319-08509-8_8","DOIUrl":"https://doi.org/10.1007/978-3-319-08509-8_8","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114743831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract) 基于触发器的隐蔽恶意软件的指令级隐写术-(扩展摘要)
Dennis Andriesse, H. Bos
{"title":"Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract)","authors":"Dennis Andriesse, H. Bos","doi":"10.1007/978-3-319-08509-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-08509-8_3","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Quantifiable Run-Time Kernel Attack Surface Reduction 可量化的运行时内核攻击面缩减
Anil Kurmus, Sergej Dechand, R. Kapitza
{"title":"Quantifiable Run-Time Kernel Attack Surface Reduction","authors":"Anil Kurmus, Sergej Dechand, R. Kapitza","doi":"10.1007/978-3-319-08509-8_12","DOIUrl":"https://doi.org/10.1007/978-3-319-08509-8_12","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133177173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
AV-Meter: An Evaluation of Antivirus Scans and Labels AV-Meter:反病毒扫描和标签的评估
Aziz Mohaisen, Omar Alrawi
{"title":"AV-Meter: An Evaluation of Antivirus Scans and Labels","authors":"Aziz Mohaisen, Omar Alrawi","doi":"10.1007/978-3-319-08509-8_7","DOIUrl":"https://doi.org/10.1007/978-3-319-08509-8_7","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115072627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics 我感觉到是你:用传感器增强的击键动力学验证移动用户
Cristiano Giuffrida, Kamil Majdanik, M. Conti, H. Bos
{"title":"I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics","authors":"Cristiano Giuffrida, Kamil Majdanik, M. Conti, H. Bos","doi":"10.1007/978-3-319-08509-8_6","DOIUrl":"https://doi.org/10.1007/978-3-319-08509-8_6","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115592381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信