Atjaunināt sīkdatņu piekrišanu

E-grāmata: Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 14828
  • Izdošanas datums: 10-Jul-2024
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031641718
  • Formāts - EPUB+DRM
  • Cena: 118,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 14828
  • Izdošanas datums: 10-Jul-2024
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031641718

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 1719, 2024.





The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.
.- Vulnerability Detection and Defense.

.- Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries.

.- S2malloc: Statistically Secure Allocator for Use-After-Free Protection And
More.

.- Acoustic Side-Channel Attacks on a Computer Mouse.

.- Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A
Case Study.

.- Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU
Architectures.

.- Malware and Threats. 

.- Constructs of Deceit: Exploring Nuances in Modern Social Engineering
Attacks.

.- Tarallo: Evading Behavioral Malware Detectors in the Problem Space.

.- Evading Userland API Hooking, Again: Novel Attacks and a Principled
Defense Method.

.- Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based
Static Detectors.

.- Listening between the Bits: Privacy Leaks in Audio Fingerprints.

.- Mobile and Web Application Security. 

.- Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the
Effectiveness of Unrestricted File Upload Vulnerability Scanners.

.- SandPuppy: Deep-state fuzzing guided by automatic detection of
state-representative variables.

.- Extended Abstract - Tracking Manifests - Persistent Identifiers in
Progressive Web Apps.

.- PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location.

.- Knocking on Admins Door: Protecting Critical Web Applications with
Deception.

.- AI for Security.

.- Approach for the Optimization of Machine Learning Models for Calculating
Binary Function Similarity.

.- Inferring Recovery Steps from Cyber Threat Intelligence Reports.

.- Pairing Security Advisories with Vulnerable Functions Using Open-Source
LLMs.

.- Extended Abstract: Assessing Language Models for Semantic Textual
Similarity in Cybersecurity.

.- Extended Abstract: A Transfer Learning-based Training Approach for DGA
Classification.

.- Hardware and Firmware Security. 

.- Seum Spread: Discerning Security Flaws in IoT Firmware Via Call Sequence
Semantics.

.- Gluezilla: Efficient and Scalable Software to Hardware Binding using
Rowhammer.

.- SmmPack: Obfuscation for SMM Modules.

.- Presshammer: Rowhammer and Rowpress without Physical Address Information.

.- Cyber Physical Systems and IoT. 

.- SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based
on Configuration Files and Logs.

.- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart
Electrical Grids.

.- Wireless Modulation Identification: filling the gap in IoT networks
security audit.

.- Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids.