Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

Author:   Magnus Almgren ,  Vincenzo Gulisano ,  Federico Maggi
Publisher:   Springer International Publishing AG
Edition:   2015 ed.
Volume:   9148
ISBN:  

9783319205496


Pages:   351
Publication Date:   06 July 2015
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

Full Product Details

Author:   Magnus Almgren ,  Vincenzo Gulisano ,  Federico Maggi
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2015 ed.
Volume:   9148
Dimensions:   Width: 15.50cm , Height: 1.90cm , Length: 23.50cm
Weight:   5.504kg
ISBN:  

9783319205496


ISBN 10:   3319205498
Pages:   351
Publication Date:   06 July 2015
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.- “Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.- C5: Cross-Cores Cache Covert Channel.- Intrusion Detection for Airborne Communication Using PHY-Layer Information.- That Ain’t You: Blocking Spearphishing Through Behavioral Modelling.- Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics.- Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.- Fine-Grained Control-Flow Integrity Through Binary Hardening.- Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.- The Role of Cloud Services in MaliciousSoftware: Trends and Insights.- Capturing DDoS Attack Dynamics Behind the Scenes.- Quit Playing Games with My Heart: Understanding Online Dating Scams.- More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.- May I? - Content Security Policy Endorsement for Browser Extensions.- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.- Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.- Controlled Data Sharing for Collaborative Predictive Blacklisting.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List