Detection of Intrusions and Malware, and Vulnerability Assessment

14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings

  • Michalis Polychronakis
  • Michael Meier
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10327)

Table of contents

  1. Front Matter
    Pages I-X
  2. Enclaves and Isolation

    1. Front Matter
      Pages 1-1
    2. Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard
      Pages 3-24
    3. Shruti Tople, Prateek Saxena
      Pages 25-47
    4. Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis
      Pages 48-69
  3. Malware Analysis

    1. Front Matter
      Pages 71-71
    2. Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D’Alessio, Lorenzo Fontana, Fabio Gritti et al.
      Pages 73-96
    3. Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner et al.
      Pages 97-118
    4. George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras et al.
      Pages 119-138
  4. Cyber-physical Systems

    1. Front Matter
      Pages 139-139
    2. Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero
      Pages 185-206
  5. Detection and Protection

    1. Front Matter
      Pages 207-207
    2. Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla
      Pages 209-229
    3. Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang et al.
      Pages 230-251
    4. Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou
      Pages 252-276
  6. Code Analysis

    1. Front Matter
      Pages 277-277
    2. Sam L. Thomas, Flavio D. Garcia, Tom Chothia
      Pages 279-300

About these proceedings

Introduction

 

This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017.

The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.

Keywords

Network security privacy anonymity cryptography security and privacy for big data security and privacy metrics attacks security protocols web security mobile and wireless security denial-of-service attacks phishing malware and its mitigation intrusion detection systems virtualization and security operating system security

Editors and affiliations

  • Michalis Polychronakis
    • 1
  • Michael Meier
    • 2
  1. 1.Stony Brook UniversityStony BrookUSA
  2. 2.University of Bonn and Fraunhofer FKIEBonnGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-60876-1
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-60875-4
  • Online ISBN 978-3-319-60876-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book