


default search action
DIMVA 2020: Lisbon, Portugal
- Clémentine Maurice

, Leyla Bilge, Gianluca Stringhini, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12223, Springer 2020, ISBN 978-3-030-52682-5
Vulnerability Discovery and Analysis
- Emil Wåreus, Martin Hell:

Automated CPE Labeling of CVE Summaries with Machine Learning. 3-22 - Marc Ohm

, Henrik Plate, Arnold Sykosch, Michael Meier
:
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. 23-43 - Herson Esquivel-Vargas

, Marco Caselli, Geert Jan Laanstra, Andreas Peter:
Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective. 44-64
Attacks
- Pierre Ciholas, Jose Miguel Such

, Angelos K. Marnerides
, Benjamin Green, Jiajie Zhang, Utz Roedig
:
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode. 67-88 - Zixuan Zhao, Yan Wang, Xiaorui Gong:

HAEPG: An Automatic Multi-hop Exploitation Generation Framework. 89-109 - En He, Daoyuan Wu

, Robert H. Deng
:
Understanding Android VoIP Security: A System-Level Vulnerability Assessment. 110-131
Web Security
- Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis:

Web Runner 2049: Evaluating Third-Party Anti-bot Services. 135-159 - Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis:

Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers. 160-170 - Takashi Koide, Daiki Chiba

, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites. 171-191 - Marcus Botacin, Giovanni Bertão, Paulo L. de Geus, André Grégio, Christopher Kruegel, Giovanni Vigna:

On the Security of Application Installers and Online Software Repositories. 192-214
Detection and Containment
- Alexios Voulimeneas

, Dokyung Song
, Fabian Parzefall
, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert
:
Distributed Heterogeneous N-Variant Execution. 217-237 - Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:

Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. 238-258 - Sadullah Canakci, Leila Delshadtehrani, Boyou Zhou

, Ajay Joshi, Manuel Egele:
Efficient Context-Sensitive CFI Enforcement Through a Hardware Monitor. 259-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














