International Conference on Detection of intrusions and malware, and vulnerability assessment最新文献

筛选
英文 中文
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware PowerDrive:准确的去混淆和分析PowerShell恶意软件
Denis Ugarte, Davide Maiorca, Fabrizio Cara, G. Giacinto
{"title":"PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware","authors":"Denis Ugarte, Davide Maiorca, Fabrizio Cara, G. Giacinto","doi":"10.1007/978-3-030-22038-9_12","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_12","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Practical Enclave Malware with Intel SGX 实用Enclave恶意软件与英特尔SGX
Michael Schwarz, Samuel Weiser, D. Gruss
{"title":"Practical Enclave Malware with Intel SGX","authors":"Michael Schwarz, Samuel Weiser, D. Gruss","doi":"10.1007/978-3-030-22038-9_9","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_9","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Extended Abstract: Toward Systematically Exploring Antivirus Engines 面向系统探索反病毒引擎
Davide Quarta, Federico Salvioni, Andrea Continella, S. Zanero
{"title":"Extended Abstract: Toward Systematically Exploring Antivirus Engines","authors":"Davide Quarta, Federico Salvioni, Andrea Continella, S. Zanero","doi":"10.1007/978-3-319-93411-2_18","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_18","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"379 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120886116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Weaknesses of Function Table Randomization 论函数表随机化的缺点
Moritz Contag, R. Gawlik, Andre Pawlowski, Thorsten Holz
{"title":"On the Weaknesses of Function Table Randomization","authors":"Moritz Contag, R. Gawlik, Andre Pawlowski, Thorsten Holz","doi":"10.1007/978-3-319-93411-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_9","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript JaSt:恶意(混淆)JavaScript的完全语法检测
Aurore Fass, Robert P. Krawczyk, M. Backes, Ben Stock
{"title":"JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript","authors":"Aurore Fass, Robert P. Krawczyk, M. Backes, Ben Stock","doi":"10.1007/978-3-319-93411-2_14","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_14","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123434489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 诈骗克星:高级金融欺诈的时间分析和检测
Michele Carminati, Alessandro Baggio, F. Maggi, U. Spagnolini, S. Zanero
{"title":"FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds","authors":"Michele Carminati, Alessandro Baggio, F. Maggi, U. Spagnolini, S. Zanero","doi":"10.1007/978-3-319-93411-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_10","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Symbolic Deobfuscation: From Virtualized Code Back to the Original 符号去混淆:从虚拟代码回到原始代码
Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet
{"title":"Symbolic Deobfuscation: From Virtualized Code Back to the Original","authors":"Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet","doi":"10.1007/978-3-319-93411-2_17","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_17","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Honey, I Shrunk Your App Security: The State of Android App Hardening 亲爱的,我缩小了你的应用程序的安全性:Android应用程序加固的状态
Vincent Haupert, D. Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller
{"title":"Honey, I Shrunk Your App Security: The State of Android App Hardening","authors":"Vincent Haupert, D. Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller","doi":"10.1007/978-3-319-93411-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_4","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121976458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM 基于dma的Rowhammer攻击在ARM上的实际缓解
V. V. D. Veen, Martina Lindorfer, Y. Fratantonio, H. Pillai, G. Vigna, Christopher Krügel, H. Bos, Kaveh Razavi
{"title":"GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM","authors":"V. V. D. Veen, Martina Lindorfer, Y. Fratantonio, H. Pillai, G. Vigna, Christopher Krügel, H. Bos, Kaveh Razavi","doi":"10.1007/978-3-319-93411-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_5","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133672325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation ELISA:提取用于细粒度代码和数据分离的原始二进制文件的ISA
P. Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, S. Zanero
{"title":"ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation","authors":"P. Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, S. Zanero","doi":"10.1007/978-3-319-93411-2_16","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_16","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"10 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信