Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Detection of intrusions and malware,...
~
(1998 :)
Detection of intrusions and malware, and vulnerability assessment18th International Conference, DIMVA 2021, virtual event, July 14-16, 2021 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Detection of intrusions and malware, and vulnerability assessmentedited by Leyla Bilge ... [et al.].
Reminder of title:
18th International Conference, DIMVA 2021, virtual event, July 14-16, 2021 : proceedings /
remainder title:
DIMVA 2021
other author:
Bilge, Leyla.
corporate name:
Published:
Cham :Springer International Publishing :2021.
Description:
xii, 390 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Intrusion detection systems (Computer security)
Online resource:
https://doi.org/10.1007/978-3-030-80825-9
ISBN:
9783030808259$q(electronic bk.)
Detection of intrusions and malware, and vulnerability assessment18th International Conference, DIMVA 2021, virtual event, July 14-16, 2021 : proceedings /
Detection of intrusions and malware, and vulnerability assessment
18th International Conference, DIMVA 2021, virtual event, July 14-16, 2021 : proceedings /[electronic resource] :DIMVA 2021edited by Leyla Bilge ... [et al.]. - Cham :Springer International Publishing :2021. - xii, 390 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,127560302-9743 ;. - Lecture notes in computer science ;4891..
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures -- The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild -- Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs -- Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy -- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device -- Refined Grey-Box Fuzzing with Sivo -- SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning -- SPECULARIZER: Uncovering Speculative Execution Attacks via Performance Tracing in Commodity Hardware -- Aion Attacks: Exposing Software Timer Problem in Trusted Execution Environment -- Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels -- Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races -- FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security -- Introspect Virtual Machines Like It Is the Linux Kernel! -- Calibration Done Right: Noiseless Flush+Flush Attacks -- Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates From Naturally Occurring Invariants -- PetaDroid: Adaptive Android Malware Detection using Deep Learning -- Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings -- Extended Abstract: A First Large-scale Analysis on Usage of MTA-STS -- Centy: Scalable Server-side Web Integrity Verification System Based on Fuzzy Hashes.
Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
ISBN: 9783030808259$q(electronic bk.)
Standard No.: 10.1007/978-3-030-80825-9doiSubjects--Topical Terms:
404115
Intrusion detection systems (Computer security)
LC Class. No.: QA76.9.A25 / D55 2021
Dewey Class. No.: 005.8
Detection of intrusions and malware, and vulnerability assessment18th International Conference, DIMVA 2021, virtual event, July 14-16, 2021 : proceedings /
LDR
:03056nmm a2200373 a 4500
001
602087
003
DE-He213
005
20210703191017.0
006
m d
007
cr nn 008maaau
008
211112s2021 sz s 0 eng d
020
$a
9783030808259$q(electronic bk.)
020
$a
9783030808242$q(paper)
024
7
$a
10.1007/978-3-030-80825-9
$2
doi
035
$a
978-3-030-80825-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D55 2021
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D582 2021
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Detection of intrusions and malware, and vulnerability assessment
$h
[electronic resource] :
$b
18th International Conference, DIMVA 2021, virtual event, July 14-16, 2021 : proceedings /
$c
edited by Leyla Bilge ... [et al.].
246
3
$a
DIMVA 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 390 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12756
490
1
$a
Security and cryptology
505
0
$a
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures -- The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild -- Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs -- Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy -- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device -- Refined Grey-Box Fuzzing with Sivo -- SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning -- SPECULARIZER: Uncovering Speculative Execution Attacks via Performance Tracing in Commodity Hardware -- Aion Attacks: Exposing Software Timer Problem in Trusted Execution Environment -- Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels -- Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races -- FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security -- Introspect Virtual Machines Like It Is the Linux Kernel! -- Calibration Done Right: Noiseless Flush+Flush Attacks -- Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates From Naturally Occurring Invariants -- PetaDroid: Adaptive Android Malware Detection using Deep Learning -- Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings -- Extended Abstract: A First Large-scale Analysis on Usage of MTA-STS -- Centy: Scalable Server-side Web Integrity Verification System Based on Fuzzy Hashes.
520
$a
Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
650
0
$a
Intrusion detection systems (Computer security)
$3
404115
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Computing Milieux.
$3
275270
650
2 4
$a
Computer Crime.
$3
833604
700
1
$a
Bilge, Leyla.
$3
897655
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-80825-9
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000199737
電子館藏
1圖書
電子書
EB QA76.9.A25 D582 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-80825-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login