Skip to main content
  • Conference proceedings
  • © 2021

Detection of Intrusions and Malware, and Vulnerability Assessment

18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12756)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2021.

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-80825-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (19 papers)

  1. Front Matter

    Pages i-xii
  2. You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures

    • Tommaso Innocenti, Seyed Ali Mirheidari, Amin Kharraz, Bruno Crispo, Engin Kirda
    Pages 1-20
  3. The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild

    • Michele Benolli, Seyed Ali Mirheidari, Elham Arshad, Bruno Crispo
    Pages 21-41
  4. Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs

    • Karthika Subramani, Roberto Perdisci, Maria Konte
    Pages 42-67
  5. Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy

    • Florian Quinkert, Dennis Tatang, Thorsten Holz
    Pages 68-87
  6. Help, My Signal has Bad Device!

    • Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
    Pages 88-105
  7. Refined Grey-Box Fuzzing with Sivo

    • Ivica Nikolić, Radu Mantu, Shiqi Shen, Prateek Saxena
    Pages 106-129
  8. SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning

    • Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz
    Pages 130-150
  9. Specularizer : Detecting Speculative Execution Attacks via Performance Tracing

    • Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin
    Pages 151-172Open Access
  10. Aion Attacks: Manipulating Software Timers in Trusted Execution Environment

    • Wei Huang, Shengjie Xu, Yueqiang Cheng, David Lie
    Pages 173-193
  11. Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races

    • Omid Setayeshfar, Junghwan “John” Rhee, Chung Hwan Kim, Kyu Hyung Lee
    Pages 215-236
  12. FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security

    • Antonin Durey, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy
    Pages 237-257
  13. Introspect Virtual Machines Like It Is the Linux Kernel!

    • Ahmed Abdelraoof, Benjamin Taubmann, Thomas Dangl, Hans P. Reiser
    Pages 258-277
  14. Calibration Done Right: Noiseless Flush+Flush Attacks

    • Guillaume Didier, Clémentine Maurice
    Pages 278-298
  15. PetaDroid: Adaptive Android Malware Detection Using Deep Learning

    • ElMouatez Billah Karbab, Mourad Debbabi
    Pages 319-340
  16. Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings

    • Florian Quinkert, Martin Degeling, Thorsten Holz
    Pages 341-360
  17. Extended Abstract: A First Large-Scale Analysis on Usage of MTA-STS

    • Dennis Tatang, Robin Flume, Thorsten Holz
    Pages 361-370
  18. Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes

    • Lizzy Tengana, Jesus Solano, Alejandra Castelblanco, Esteban Rivera, Christian Lopez, Martin Ochoa
    Pages 371-390

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

    18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings

About this book

Chapter “SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Keywords

  • artificial intelligence
  • authentication
  • computer crime
  • computer networks
  • computer security
  • cryptography
  • data communication systems
  • data security
  • distributed computer systems
  • internet
  • intrusion detection
  • malware
  • network protocols
  • network security
  • operating systems
  • signal processing
  • software engineering
  • telecommunication networks

Editors and Affiliations

  • NortonLifeLock Research Group, Biot, France

    Leyla Bilge

  • King's College London, London, UK

    Lorenzo Cavallaro

  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany

    Giancarlo Pellegrino

  • University of Lisbon, Lisbon, Portugal

    Nuno Neves

Bibliographic Information

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-80825-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)