Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, DIMVA 2025, Graz, Austria, July 9–11, 2025, Proceedings, Part II

Author:   Manuel Egele ,  Veelasha Moonsamy ,  Daniel Gruss ,  Michele Carminati
Publisher:   Springer International Publishing AG
Volume:   15748
ISBN:  

9783031976223


Pages:   331
Publication Date:   23 July 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $197.97 Quantity:  
Add to Cart

Share |

Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, DIMVA 2025, Graz, Austria, July 9–11, 2025, Proceedings, Part II


Overview

Full Product Details

Author:   Manuel Egele ,  Veelasha Moonsamy ,  Daniel Gruss ,  Michele Carminati
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   15748
ISBN:  

9783031976223


ISBN 10:   3031976223
Pages:   331
Publication Date:   23 July 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.
Language:   English

Table of Contents

.- AI/ML & Security. .- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. .- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. .- Hiding in Plain Sight: On the Robustness of AI-generated code detection. .- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. .- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. .- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. .- Android & Patches. .- More Than You Signed Up For: Exposing Gaps in the Validation of Android’s App Signing. .- An Empirical Study of Multi-Language Security Patches in Open Source Software. .- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. .- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. .- OS & Network. .- Taming the Linux Memory Allocator for Rapid Prototyping. .- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. .- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. .- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. .- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. .- Resilient Systems. .- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. .- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. .- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. .- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. .- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

SEPRG2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List