Detection of Intrusions and Malware, and Vulnerability Assessment, Kartoniert / Broschiert
Detection of Intrusions and Malware, and Vulnerability Assessment
- 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025, Proceedings, Part II
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Manuel Egele, Veelasha Moonsamy, Daniel Gruss, Michele Carminati
- Verlag:
- Springer, 07/2025
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783031976223
- Artikelnummer:
- 12358895
- Umfang:
- 348 Seiten
- Gewicht:
- 528 g
- Maße:
- 235 x 155 mm
- Stärke:
- 19 mm
- Erscheinungstermin:
- 23.7.2025
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Weitere Ausgaben von Detection of Intrusions and Malware, and Vulnerability Assessment |
Preis |
---|---|
Buch, Kartoniert / Broschiert, Englisch | EUR 63,51* |
Klappentext
.- AI/ML & Security.
.- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines.
.- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments.
.- Hiding in Plain Sight: On the Robustness of AI-generated code detection.
.- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks.
.- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains.
.- Poster: Using Machine Learning to Infer Network Structure from Security Metadata.
.- Android & Patches.
.- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing.
.- An Empirical Study of Multi-Language Security Patches in Open Source Software.
.- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS.
.- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities.
.- OS & Network.
.- Taming the Linux Memory Allocator for Rapid Prototyping.
.- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation.
.- Overlapping data in network protocols: bridging OS and NIDS reassembly gap.
.- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs.
.- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel.
.- Resilient Systems.
.- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification.
.- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts.
.- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors.
.- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation.
.- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
