Detection of Intrusions and Malware, and Vulnerability Assessment (Record no. 88547)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05934nam a22006615i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-64171-8 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730172755.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240711s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031641718 |
-- | 978-3-031-64171-8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Detection of Intrusions and Malware, and Vulnerability Assessment |
Sub Title | 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIV, 558 p. 151 illus., 120 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | -- Vulnerability Detection and Defense. -- Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries. -- S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More. -- Acoustic Side-Channel Attacks on a Computer Mouse. -- Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study. -- Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. -- Malware and Threats. -- Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks. -- Tarallo: Evading Behavioral Malware Detectors in the Problem Space. -- Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. -- Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. -- Listening between the Bits: Privacy Leaks in Audio Fingerprints. -- Mobile and Web Application Security. -- Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners. -- SandPuppy: Deep-state fuzzing guided by automatic detection of state-representative variables. -- Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps. -- PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. -- Knocking on Admin's Door: Protecting Critical Web Applications with Deception. -- AI for Security. -- Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. -- Inferring Recovery Steps from Cyber Threat Intelligence Reports. -- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. -- Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity. -- Extended Abstract: A Transfer Learning-based Training Approach for DGA Classification. -- Hardware and Firmware Security. -- Seum Spread: Discerning Security Flaws in IoT Firmware Via Call Sequence Semantics. -- Gluezilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. -- SmmPack: Obfuscation for SMM Modules. -- Presshammer: Rowhammer and Rowpress without Physical Address Information. -- Cyber Physical Systems and IoT. -- SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. -- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. -- Wireless Modulation Identification: filling the gap in IoT networks security audit. -- Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT. |
700 1# - AUTHOR 2 | |
Author 2 | Maggi, Federico. |
700 1# - AUTHOR 2 | |
Author 2 | Egele, Manuel. |
700 1# - AUTHOR 2 | |
Author 2 | Payer, Mathias. |
700 1# - AUTHOR 2 | |
Author 2 | Carminati, Michele. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-64171-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer engineering. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Criminology. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Quantum physics. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Engineering and Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computing Milieux. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Crime Control and Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Quantum Physics. |
700 1# - AUTHOR 2 | |
-- | (orcid) |
-- | 0000-0003-1073-8036 |
700 1# - AUTHOR 2 | |
-- | (orcid) |
-- | 0000-0001-5038-2682 |
700 1# - AUTHOR 2 | |
-- | (orcid) |
-- | 0000-0001-5054-7547 |
700 1# - AUTHOR 2 | |
-- | (orcid) |
-- | 0000-0001-8284-6074 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1611-3349 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.