Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)
18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings
Redaktion: Bilge, Leyla; Neves, Nuno; Pellegrino, Giancarlo; Cavallaro, Lorenzo
53,95 €
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
27 °P sammeln
53,95 €
Als Download kaufen
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
27 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
27 °P sammeln
Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)
18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings
Redaktion: Bilge, Leyla; Neves, Nuno; Pellegrino, Giancarlo; Cavallaro, Lorenzo
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 17.18MB
Andere Kunden interessierten sich auch für
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)59,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)89,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)89,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)57,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)40,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)53,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)40,95 €
-
-
-
Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 391
- Erscheinungstermin: 9. Juli 2021
- Englisch
- ISBN-13: 9783030808259
- Artikelnr.: 62239007
- Verlag: Springer International Publishing
- Seitenzahl: 391
- Erscheinungstermin: 9. Juli 2021
- Englisch
- ISBN-13: 9783030808259
- Artikelnr.: 62239007
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures.- The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild.- Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs.- Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy.- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device.- Refined Grey-Box Fuzzing with Sivo.- SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning.- SPECULARIZER: Uncovering Speculative Execution Attacks via Performance Tracing in Commodity Hardware.- Aion Attacks: Exposing Software Timer Problem in Trusted Execution Environment.- Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels.- Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races.- FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security.- Introspect Virtual Machines Like It Is the Linux Kernel!.- Calibration Done Right: Noiseless Flush+Flush Attacks.- Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates From Naturally Occurring Invariants.- PetaDroid: Adaptive Android Malware Detection using Deep Learning.- Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings.- Extended Abstract: A First Large-scale Analysis on Usage of MTA-STS.- Centy: Scalable Server-side Web Integrity Verification System Based on Fuzzy Hashes.
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures.- The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild.- Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs.- Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy.- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device.- Refined Grey-Box Fuzzing with Sivo.- SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning.- SPECULARIZER: Uncovering Speculative Execution Attacks via Performance Tracing in Commodity Hardware.- Aion Attacks: Exposing Software Timer Problem in Trusted Execution Environment.- Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels.- Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races.- FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security.- Introspect Virtual Machines Like It Is the Linux Kernel!.- Calibration Done Right: Noiseless Flush+Flush Attacks.- Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates From Naturally Occurring Invariants.- PetaDroid: Adaptive Android Malware Detection using Deep Learning.- Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings.- Extended Abstract: A First Large-scale Analysis on Usage of MTA-STS.- Centy: Scalable Server-side Web Integrity Verification System Based on Fuzzy Hashes.