找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 9th International Co Ulrich Flegel,Evangelos Markatos,William Robertson

[復制鏈接]
查看: 37305|回復: 49
樓主
發(fā)表于 2025-3-21 19:13:46 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment
副標題9th International Co
編輯Ulrich Flegel,Evangelos Markatos,William Robertson
視頻videohttp://file.papertrans.cn/270/269228/269228.mp4
概述State-of-the-art research.Fast-track conference proceedings.Unique visibility
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 9th International Co Ulrich Flegel,Evangelos Markatos,William Robertson
描述This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).
出版日期Conference proceedings 2013
關鍵詞code reuse; intrusion recovery; malware classification; mobile devices; network forensics
版次1
doihttps://doi.org/10.1007/978-3-642-37300-8
isbn_softcover978-3-642-37299-5
isbn_ebook978-3-642-37300-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2013
The information of publication is updating

書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment影響因子(影響力)




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment影響因子(影響力)學科排名




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment網(wǎng)絡公開度




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment網(wǎng)絡公開度學科排名




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment被引頻次




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment被引頻次學科排名




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment年度引用




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment年度引用學科排名




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment讀者反饋




書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment讀者反饋學科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權限
沙發(fā)
發(fā)表于 2025-3-21 22:30:03 | 只看該作者
板凳
發(fā)表于 2025-3-22 03:48:59 | 只看該作者
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applicationsiracy, or are instances of known malware. We evaluate our system using more than 58,000 Android applications and demonstrate that our system scales well and is effective. Our results show that Juxtapp is able to detect: 1) . applications with confirmed buggy code reuse that can lead to serious vulne
地板
發(fā)表于 2025-3-22 05:01:21 | 只看該作者
ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus SystemsWe demonstrate the efficacy of ADAM using 222 Android malware samples that we collected in the wild. Using ADAM, we generate different variants based on our collected malware samples, and evaluate the detection of these variants against commercial anti-virus systems.
5#
發(fā)表于 2025-3-22 09:13:01 | 只看該作者
A Static, Packer-Agnostic Filter to Detect Similar Malware Samplesthe costly task of preliminary unpacking, but instead, operates directly on packed code. Our approach exploits the fact that current packers use compression and weak encryption schemes that do not break, in the packed versions, all the similarities existing between the original versions of two progr
6#
發(fā)表于 2025-3-22 13:58:13 | 只看該作者
Tracking Memory Writes for Malware Classification and Code Reuse Identification validate our proposed techniques, we analyzed 16,248 malware samples. We found that our techniques produce clusters with high accuracy, as well as interesting cases of code reuse among malicious programs.
7#
發(fā)表于 2025-3-22 17:09:28 | 只看該作者
NetGator: Malware Detection Using Program Interactive Challengese to correctly solve and respond to the challenge, NetGator flags the flow as potential malware. Our approach is seamless and requires no interaction from the user and no changes on the commodity application software. NetGator introduces a minimal traffic latency (0.35 seconds on average) to normal
8#
發(fā)表于 2025-3-22 22:47:45 | 只看該作者
: Secure Smartphone-Assisted Login on Compromised Machines point of this proxy is that it can be accessed from untrusted or even compromised machines via a WiFi or a USB connection, so as to enable secure logins, while at the same time preventing the attacker (who is controlling the machine) from seeing crucial data like user credentials or browser cookies
9#
發(fā)表于 2025-3-23 05:15:00 | 只看該作者
10#
發(fā)表于 2025-3-23 07:56:01 | 只看該作者
Detection of Intrusions and Malware, and Vulnerability Assessment9th International Co
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-11 14:04
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
莲花县| 承德市| 黄冈市| 太白县| 九龙城区| 扎鲁特旗| 青阳县| 辽宁省| 万州区| 太仓市| 仁怀市| 松阳县| 桑日县| 孟连| 巴林右旗| 五台县| 天长市| 南江县| 福海县| 都匀市| 莱阳市| 徐汇区| 康平县| 德保县| 北海市| 常宁市| 黄山市| 嘉黎县| 湖北省| 大安市| 临漳县| 吉木萨尔县| 大兴区| 呈贡县| 富川| 茂名市| 外汇| 铅山县| 绿春县| 永年县| 西宁市|