Atjaunināt sīkdatņu piekrišanu

E-grāmata: Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 9148
  • Izdošanas datums: 22-Jun-2015
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319205502
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 9148
  • Izdošanas datums: 22-Jun-2015
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319205502

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015.
The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.
Attacks
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
3(22)
Amin Kharraz
William Robertson
Davide Balzarotti
Leyla Bilge
En Gin Kirda
"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them
25(21)
Bernhard Grill
Andrei Bacs
Christian Platzer
Herbert Bos
C5: Cross-Cores Cache Covert Channel
46(21)
Clementine Maurice
Christoph Neumann
Olivier Heen
Aurelien Francillon
Attack Detection
Intrusion Detection for Airborne Communication Using PHY-Layer Information
67(11)
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
That Ain't You: Blocking Spearphishing Through Behavioral Modelling
78(20)
Gianluca Stringhini
Olivier Thonnard
Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics
98(23)
Tobias Wuchner
Martin Ochoa
Alexander Pretschner
Binary Analysis and Mobile Malware Protection
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries
121(23)
Mario Polino
Andrea Scorti
Federico Maggi
Stefano Zanero
Fine-Grained Control-Flow Integrity Through Binary Hardening
144(21)
Mathias Payer
Antonio Barresi
Thomas R. Gross
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software
165(22)
Iasonas Polakis
Michalis Diamantaris
Thanasis Petsas
Federico Maggi
Sotiris Ioannidis
Social Networks and Large-Scale Attacks
The Role of Cloud Services in Malicious Software: Trends and Insights
187(18)
Xiao Han
Nizar Kheir
Davide Balzarotti
Capturing DDoS Attack Dynamics Behind the Scenes
205(11)
An Wang
Aziz Mohaisen
Wentao Chang
Songqing Chen
Quit Playing Games with My Heart: Understanding Online Dating Scams
216(23)
JingMin Huang
Gianluca Stringhini
Peng Yong
Web and Mobile Security
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations
239(22)
Ethan Shernan
Henry Carter
Dave Tian
Patrick Traynor
Kevin Butler
May I? - Content Security Policy Endorsement for Browser Extensions
261(21)
Daniel Hausknecht
Jonas Magazinius
Andrei Sabelfeld
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users
282(25)
Yanick Fratantonio
Antonio Bianchi
William Robertson
Manuel Egele
Christopher Kruegel
Engin Kirda
Giovanni Vigna
Provenance and Data Sharing
Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network
307(20)
Yuan Yang
Zhongmin Cai
Weixuan Mao
Zhihai Yang
Controlled Data Sharing for Collaborative Predictive Blacklisting
327(24)
Julien Freudiger
Emiliano De Cristofaro
Alejandro E. Brito
Author Index 351