Detection of Intrusions and Malware, and Vulnerability Assessment

13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings

  • Caballero Juan 
  • Zurutuza Urko 
  • Rodríguez Ricardo J. 
Conference proceedings DIMVA 2016

DOI: 10.1007/978-3-319-40667-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9721)

Table of contents (21 papers)

  1. Front Matter
    Pages I-XIII
  2. Attacks

    1. Front Matter
      Pages 1-1
    2. Subverting Operating System Properties Through Evolutionary DKOM Attacks
      Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti
      Pages 3-24
    3. DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries
      Konstantin Böttinger, Claudia Eckert
      Pages 25-34
  3. Defenses

    1. Front Matter
      Pages 35-35
    2. AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks
      Jeff Perkins, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, Martin Rinard
      Pages 37-57
    3. AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices
      Sergio Pastrana, Juan Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López
      Pages 58-77
    4. Towards Vulnerability Discovery Using Staged Program Analysis
      Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert
      Pages 78-97
  4. Malware Detection

    1. Front Matter
      Pages 99-99
    2. Comprehensive Analysis and Detection of Flash-Based Malware
      Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck
      Pages 101-121
    3. Reviewer Integration and Performance Measurement for Malware Detection
      Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy et al.
      Pages 122-141
    4. On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware
      Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon
      Pages 142-162
  5. Evasion

    1. Front Matter
      Pages 163-163
    2. Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows
      Andre Pawlowski, Moritz Contag, Thorsten Holz
      Pages 165-185
    3. RAMBO: Run-Time Packer Analysis with Multiple Branch Observation
      Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo G. Bringas
      Pages 186-206
    4. Detecting Hardware-Assisted Virtualization
      Michael Brengel, Michael Backes, Christian Rossow
      Pages 207-227
  6. Web Security

    1. Front Matter
      Pages 229-229
    2. Financial Lower Bounds of Online Advertising Abuse
      Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee et al.
      Pages 231-254
    3. Google Dorks: Analysis, Creation, and New Defenses
      Flavio Toffalini, Maurizio Abbà, Damiano Carra, Davide Balzarotti
      Pages 255-275
  7. Data Leaks

    1. Front Matter
      Pages 277-277

About these proceedings


This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016.

The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation. 


device authentication hardware security security attacks vulnerability and analysis Web application security authentication data leaks embedded devices information flow control internet-of-things malware classification malware detection obfuscation program analysis program transformation return oriented programming security and privacy sensor fingerprinting software and application security

Editors and affiliations

  • Caballero Juan 
    • 1
  • Zurutuza Urko 
    • 2
  • Rodríguez Ricardo J. 
    • 3
  1. 1.IMDEA Software InstitutePozuelo de AlarcónSpain
  2. 2.Mondragon UniversityArrasateSpain
  3. 3.Universidad de ZaragozaZaragozaSpain

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-40666-4
  • Online ISBN 978-3-319-40667-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349