|
|
|
|
LEADER |
03382nmm a2200457 u 4500 |
001 |
EB001899442 |
003 |
EBX01000000000000001062351 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
200810 ||| eng |
020 |
|
|
|a 9783030526832
|
100 |
1 |
|
|a Maurice, Clémentine
|e [editor]
|
245 |
0 |
0 |
|a Detection of Intrusions and Malware, and Vulnerability Assessment
|h Elektronische Ressource
|b 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings
|c edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
|
250 |
|
|
|a 1st ed. 2020
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2020, 2020
|
300 |
|
|
|a XII, 281 p. 234 illus., 60 illus. in color
|b online resource
|
505 |
0 |
|
|a Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Software engineering
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Software Engineering
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Engineering and Networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Information technology / Law and legislation
|
653 |
|
|
|a Computer engineering
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computers / Law and legislation
|
653 |
|
|
|a Legal Aspects of Computing
|
700 |
1 |
|
|a Bilge, Leyla
|e [editor]
|
700 |
1 |
|
|a Stringhini, Gianluca
|e [editor]
|
700 |
1 |
|
|a Neves, Nuno
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-030-52683-2
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-52683-2?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic
|