This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June - July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June - July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.
Hybrid Pruning: Towards A Precise Static Analysis.- Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models.- Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.- COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.- Prioritizing Antivirus Alerts on Internal Enterprise Machines.- VANDALIR: Vulnerability Analyses based on Datalog and LLVM-IR.- Branch Different - Spectre Attacks on Apple Silicon.- MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys .- A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities.- Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.- Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Hybrid Pruning: Towards A Precise Static Analysis.- Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models.- Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.- COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.- Prioritizing Antivirus Alerts on Internal Enterprise Machines.- VANDALIR: Vulnerability Analyses based on Datalog and LLVM-IR.- Branch Different - Spectre Attacks on Apple Silicon.- MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys .- A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities.- Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.- Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826