Skip to main content
  • Conference proceedings
  • © 2017

Detection of Intrusions and Malware, and Vulnerability Assessment

14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10327)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (18 papers)

  1. Front Matter

    Pages I-X
  2. Enclaves and Isolation

    1. Front Matter

      Pages 1-1
    2. Malware Guard Extension: Using SGX to Conceal Cache Attacks

      • Michael Schwarz, Samuel Weiser, Daniel Gruss, ClĂ©mentine Maurice, Stefan Mangard
      Pages 3-24
    3. On the Trade-Offs in Oblivious Execution Techniques

      • Shruti Tople, Prateek Saxena
      Pages 25-47
    4. MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems

      • Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis
      Pages 48-69
  3. Malware Analysis

    1. Front Matter

      Pages 71-71
    2. Measuring and Defeating Anti-Instrumentation-Equipped Malware

      • Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D’Alessio, Lorenzo Fontana, Fabio Gritti et al.
      Pages 73-96
    3. DynODet: Detecting Dynamic Obfuscation in Malware

      • Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner et al.
      Pages 97-118
    4. Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage

      • George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras et al.
      Pages 119-138
  4. Cyber-physical Systems

    1. Front Matter

      Pages 139-139
    2. A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks

      • Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero
      Pages 185-206
  5. Detection and Protection

    1. Front Matter

      Pages 207-207
    2. Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps

      • Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla
      Pages 209-229
    3. SPEAKER: Split-Phase Execution of Application Containers

      • Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang et al.
      Pages 230-251
    4. Deep Ground Truth Analysis of Current Android Malware

      • Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou
      Pages 252-276
  6. Code Analysis

    1. Front Matter

      Pages 277-277
    2. HumIDIFy: A Tool for Hidden Functionality Detection in Firmware

      • Sam L. Thomas, Flavio D. Garcia, Tom Chothia
      Pages 279-300

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

About this book

 

This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017.

The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.

Keywords

  • Network security
  • privacy
  • anonymity
  • cryptography
  • security and privacy for big data
  • security and privacy metrics
  • attacks
  • security protocols
  • web security
  • mobile and wireless security
  • denial-of-service attacks
  • phishing
  • malware and its mitigation
  • intrusion detection systems
  • virtualization and security
  • operating system security

Editors and Affiliations

  • Stony Brook University, Stony Brook, USA

    Michalis Polychronakis

  • University of Bonn and Fraunhofer FKIE, Bonn, Germany

    Michael Meier

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access