


default search action
DIMVA 2021: Virtual Event
- Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves:

Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings. Lecture Notes in Computer Science 12756, Springer 2021, ISBN 978-3-030-80824-2 - Tommaso Innocenti

, Seyed Ali Mirheidari
, Amin Kharraz, Bruno Crispo, Engin Kirda:
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures. 1-20 - Michele Benolli, Seyed Ali Mirheidari

, Elham Arshad, Bruno Crispo:
The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild. 21-41 - Karthika Subramani, Roberto Perdisci, Maria Konte:

Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs. 42-67 - Florian Quinkert, Dennis Tatang, Thorsten Holz:

Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy. 68-87 - Jan Wichelmann

, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
:
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device. 88-105 - Ivica Nikolic, Radu Mantu, Shiqi Shen, Prateek Saxena:

Refined Grey-Box Fuzzing with Sivo. 106-129 - Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz:

SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. 130-150 - Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:

Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. 151-172 - Wei Huang, Shengjie Xu

, Yueqiang Cheng, David Lie:
Aion Attacks: Manipulating Software Timers in Trusted Execution Environment. 173-193 - Chuhong Yuan, Dong Du, Haibo Chen:

Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels. 194-214 - Omid Setayeshfar, Junghwan John Rhee, Chung Hwan Kim

, Kyu Hyung Lee:
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races. 215-236 - Antonin Durey, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy:

FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security. 237-257 - Ahmed Abdelraoof, Benjamin Taubmann, Thomas Dangl, Hans P. Reiser

:
Introspect Virtual Machines Like It Is the Linux Kernel! 258-277 - Guillaume Didier

, Clémentine Maurice:
Calibration Done Right: Noiseless Flush+Flush Attacks. 278-298 - Yu-Jye Tung, Ian G. Harris:

Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates from Naturally Occurring Invariants. 299-318 - ElMouatez Billah Karbab, Mourad Debbabi

:
PetaDroid: Adaptive Android Malware Detection Using Deep Learning. 319-340 - Florian Quinkert, Martin Degeling

, Thorsten Holz:
Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings. 341-360 - Dennis Tatang, Robin Flume, Thorsten Holz:

Extended Abstract: A First Large-Scale Analysis on Usage of MTA-STS. 361-370 - Lizzy Tengana

, Jesus Solano
, Alejandra Castelblanco
, Esteban Rivera
, Christian Lopez
, Martín Ochoa
:
Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes. 371-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














