International Conference on Detection of intrusions and malware, and vulnerability assessment最新文献

筛选
英文 中文
New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild 网络上的新生:WebAssembly在野外流行的研究
Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck
{"title":"New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild","authors":"Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck","doi":"10.1007/978-3-030-22038-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_2","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"70 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
On Deception-Based Protection Against Cryptographic Ransomware 基于欺骗的加密勒索软件防护研究
Ziya Alper Genç, G. Lenzini, D. Sgandurra
{"title":"On Deception-Based Protection Against Cryptographic Ransomware","authors":"Ziya Alper Genç, G. Lenzini, D. Sgandurra","doi":"10.1007/978-3-030-22038-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_11","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114221682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation BinTrimmer:通过抽象解释走向静态二进制膨胀
Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, G. Vigna, Christopher Krügel
{"title":"BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation","authors":"Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, G. Vigna, Christopher Krügel","doi":"10.1007/978-3-030-22038-9_23","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_23","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Understanding the Security of Traffic Signal Infrastructure 了解交通信号基础设施的安全性
Zhenyu Ning, Fengwei Zhang, S. Remias
{"title":"Understanding the Security of Traffic Signal Infrastructure","authors":"Zhenyu Ning, Fengwei Zhang, S. Remias","doi":"10.1007/978-3-030-22038-9_8","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_8","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Memory Categorization: Separating Attacker-Controlled Data 内存分类:分离攻击者控制的数据
M. Neugschwandtner, A. Sorniotti, Anil Kurmus
{"title":"Memory Categorization: Separating Attacker-Controlled Data","authors":"M. Neugschwandtner, A. Sorniotti, Anil Kurmus","doi":"10.1007/978-3-030-22038-9_13","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_13","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128758617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DPX: Data-Plane eXtensions for SDN Security Service Instantiation DPX: SDN安全服务实例化的数据平面扩展
Taejune Park, Yeonkeun Kim, V. Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin
{"title":"DPX: Data-Plane eXtensions for SDN Security Service Instantiation","authors":"Taejune Park, Yeonkeun Kim, V. Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin","doi":"10.1007/978-3-030-22038-9_20","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_20","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP 不需要结婚来改变你的名字!利用DCP攻击proprofit IO自动化网络
Stefan Mehner, H. König
{"title":"No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP","authors":"Stefan Mehner, H. König","doi":"10.1007/978-3-030-22038-9_19","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_19","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild Plain TXT中的安全性-观察DNS TXT记录在野外的使用情况
Adam Portier, Henry Carter, Chaz Lever
{"title":"Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild","authors":"Adam Portier, Henry Carter, Chaz Lever","doi":"10.1007/978-3-030-22038-9_18","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_18","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131746674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Security Evaluation of Industrial Radio Remote Controllers 工业无线电遥控器的安全性评价
F. Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler
{"title":"A Security Evaluation of Industrial Radio Remote Controllers","authors":"F. Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler","doi":"10.1007/978-3-030-22038-9_7","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_7","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks 角色推理+异常检测= BACnet网络中的态势感知
D. Fauri, Michail Kapsalakis, D. R. D. Santos, Elisa Costante, J. D. Hartog, S. Etalle
{"title":"Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks","authors":"D. Fauri, Michail Kapsalakis, D. R. D. Santos, Elisa Costante, J. D. Hartog, S. Etalle","doi":"10.1007/978-3-030-22038-9_22","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_22","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128620142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信