Denis Ugarte, Davide Maiorca, Fabrizio Cara, G. Giacinto
{"title":"PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware","authors":"Denis Ugarte, Davide Maiorca, Fabrizio Cara, G. Giacinto","doi":"10.1007/978-3-030-22038-9_12","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_12","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Enclave Malware with Intel SGX","authors":"Michael Schwarz, Samuel Weiser, D. Gruss","doi":"10.1007/978-3-030-22038-9_9","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_9","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Davide Quarta, Federico Salvioni, Andrea Continella, S. Zanero
{"title":"Extended Abstract: Toward Systematically Exploring Antivirus Engines","authors":"Davide Quarta, Federico Salvioni, Andrea Continella, S. Zanero","doi":"10.1007/978-3-319-93411-2_18","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_18","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"379 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120886116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moritz Contag, R. Gawlik, Andre Pawlowski, Thorsten Holz
{"title":"On the Weaknesses of Function Table Randomization","authors":"Moritz Contag, R. Gawlik, Andre Pawlowski, Thorsten Holz","doi":"10.1007/978-3-319-93411-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_9","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aurore Fass, Robert P. Krawczyk, M. Backes, Ben Stock
{"title":"JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript","authors":"Aurore Fass, Robert P. Krawczyk, M. Backes, Ben Stock","doi":"10.1007/978-3-319-93411-2_14","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_14","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123434489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michele Carminati, Alessandro Baggio, F. Maggi, U. Spagnolini, S. Zanero
{"title":"FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds","authors":"Michele Carminati, Alessandro Baggio, F. Maggi, U. Spagnolini, S. Zanero","doi":"10.1007/978-3-319-93411-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_10","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet
{"title":"Symbolic Deobfuscation: From Virtualized Code Back to the Original","authors":"Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet","doi":"10.1007/978-3-319-93411-2_17","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_17","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincent Haupert, D. Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller
{"title":"Honey, I Shrunk Your App Security: The State of Android App Hardening","authors":"Vincent Haupert, D. Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller","doi":"10.1007/978-3-319-93411-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_4","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121976458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. V. D. Veen, Martina Lindorfer, Y. Fratantonio, H. Pillai, G. Vigna, Christopher Krügel, H. Bos, Kaveh Razavi
{"title":"GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM","authors":"V. V. D. Veen, Martina Lindorfer, Y. Fratantonio, H. Pillai, G. Vigna, Christopher Krügel, H. Bos, Kaveh Razavi","doi":"10.1007/978-3-319-93411-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_5","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133672325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, S. Zanero
{"title":"ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation","authors":"P. Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, S. Zanero","doi":"10.1007/978-3-319-93411-2_16","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_16","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"10 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}