Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

Author:   Clémentine Maurice ,  Leyla Bilge ,  Gianluca Stringhini ,  Nuno Neves
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12223
ISBN:  

9783030526825


Pages:   281
Publication Date:   04 July 2020
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. ​*The conference was held virtually due to the COVID-19 pandemic.

Full Product Details

Author:   Clémentine Maurice ,  Leyla Bilge ,  Gianluca Stringhini ,  Nuno Neves
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12223
Weight:   0.456kg
ISBN:  

9783030526825


ISBN 10:   3030526828
Pages:   281
Publication Date:   04 July 2020
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Vulnerability Discovery and Analysis.- Automated CPE labeling of CVE summaries with Machine Learning.- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective.- Attacks.- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode.- HAEPG: An Automatic Multi-hop Exploitation Generation Framework.- Understanding Android VoIP Security: A System-level Vulnerability Assessment.- Web Security.- Web Runner 2049: Evaluating Third-Party Anti-bot Services.- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers.- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.- On the Security of Application Installers & Online Software Repositories.- Detection and Containment.- Distributed Heterogeneous N-Variant Execution.- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data.- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List