You are here

Back to top

Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, Dimva 2015, Milan, Italy, July 9-10, 2015, Proceedin (Paperback)

Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, Dimva 2015, Milan, Italy, July 9-10, 2015, Proceedin Cover Image
By Magnus Almgren (Editor), Vincenzo Gulisano (Editor), Federico Maggi (Editor)
$71.49
Usually Ships in 1-5 Days

Description


Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.- "Nice Boots " - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.- C5: Cross-Cores Cache Covert Channel.- Intrusion Detection for Airborne Communication Using PHY-Layer Information.- That Ain't You: Blocking Spearphishing Through Behavioral Modelling.- Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics.- Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.- Fine-Grained Control-Flow Integrity Through Binary Hardening.- Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.- The Role of Cloud Services in Malicious Software: Trends and Insights.- Capturing DDoS Attack Dynamics Behind the Scenes.- Quit Playing Games with My Heart: Understanding Online Dating Scams.- More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.- May I? - Content Security Policy Endorsement for Browser Extensions.- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.- Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.- Controlled Data Sharing for Collaborative Predictive Blacklisting.


Product Details
ISBN: 9783319205496
ISBN-10: 3319205498
Publisher: Springer
Publication Date: July 6th, 2015
Pages: 351
Language: English
Series: Lecture Notes in Computer Science