Search dblp for Publications

export results for "toc:db/conf/dimva/dimva2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dimva/AndriesseB14,
  author       = {Dennis Andriesse and
                  Herbert Bos},
  editor       = {Sven Dietrich},
  title        = {Instruction-Level Steganography for Covert Trigger-Based Malware -
                  (Extended Abstract)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {41--50},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_3},
  doi          = {10.1007/978-3-319-08509-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/AndriesseB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BaraboschEG14,
  author       = {Thomas Barabosch and
                  Sebastian Eschweiler and
                  Elmar Gerhards{-}Padilla},
  editor       = {Sven Dietrich},
  title        = {Bee Master: Detecting Host-Based Code Injection Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {235--254},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_13},
  doi          = {10.1007/978-3-319-08509-8\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BaraboschEG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GiuffridaMCB14,
  author       = {Cristiano Giuffrida and
                  Kamil Majdanik and
                  Mauro Conti and
                  Herbert Bos},
  editor       = {Sven Dietrich},
  title        = {I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced
                  Keystroke Dynamics},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_6},
  doi          = {10.1007/978-3-319-08509-8\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/GiuffridaMCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KurmusDK14,
  author       = {Anil Kurmus and
                  Sergej Dechand and
                  R{\"{u}}diger Kapitza},
  editor       = {Sven Dietrich},
  title        = {Quantifiable Run-Time Kernel Attack Surface Reduction},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {212--234},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_12},
  doi          = {10.1007/978-3-319-08509-8\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KurmusDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LindorferVSNAMPZI14,
  author       = {Martina Lindorfer and
                  Stamatis Volanis and
                  Alessandro Sisto and
                  Matthias Neugschwandtner and
                  Elias Athanasopoulos and
                  Federico Maggi and
                  Christian Platzer and
                  Stefano Zanero and
                  Sotiris Ioannidis},
  editor       = {Sven Dietrich},
  title        = {AndRadar: Fast Discovery of Android Applications in Alternative Markets},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {51--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_4},
  doi          = {10.1007/978-3-319-08509-8\_4},
  timestamp    = {Thu, 24 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/LindorferVSNAMPZI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaioKSKV14,
  author       = {Giancarlo De Maio and
                  Alexandros Kapravelos and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Sven Dietrich},
  title        = {PExy: The Other Side of Exploit Kits},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_8},
  doi          = {10.1007/978-3-319-08509-8\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MaioKSKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MohaisenA14,
  author       = {Aziz Mohaisen and
                  Omar Alrawi},
  editor       = {Sven Dietrich},
  title        = {AV-Meter: An Evaluation of Antivirus Scans and Labels},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {112--131},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_7},
  doi          = {10.1007/978-3-319-08509-8\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MohaisenA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/RietzVSK14,
  author       = {Ren{\'{e}} Rietz and
                  Michael Vogel and
                  Franka Schuster and
                  Hartmut K{\"{o}}nig},
  editor       = {Sven Dietrich},
  title        = {Parallelization of Network Intrusion Detection Systems under Attack
                  Conditions},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {172--191},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_10},
  doi          = {10.1007/978-3-319-08509-8\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/RietzVSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/RuttenbergMKNHLLP14,
  author       = {Brian E. Ruttenberg and
                  Craig Miles and
                  Lee Kellogg and
                  Vivek Notani and
                  Michael Howard and
                  Charles LeDoux and
                  Arun Lakhotia and
                  Avi Pfeffer},
  editor       = {Sven Dietrich},
  title        = {Identifying Shared Software Components to Support Malware Forensics},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_2},
  doi          = {10.1007/978-3-319-08509-8\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/RuttenbergMKNHLLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SchiavoniMCZ14,
  author       = {Stefano Schiavoni and
                  Federico Maggi and
                  Lorenzo Cavallaro and
                  Stefano Zanero},
  editor       = {Sven Dietrich},
  title        = {Phoenix: DGA-Based Botnet Tracking and Intelligence},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_11},
  doi          = {10.1007/978-3-319-08509-8\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SchiavoniMCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SlowinskaHBBB14,
  author       = {Asia Slowinska and
                  Istv{\'{a}}n Haller and
                  Andrei Bacs and
                  Silviu Baranga and
                  Herbert Bos},
  editor       = {Sven Dietrich},
  title        = {Data Structure Archaeology: Scrape Away the Dirt and Glue Back the
                  Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_1},
  doi          = {10.1007/978-3-319-08509-8\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/SlowinskaHBBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WangSL14,
  author       = {Tielei Wang and
                  Chengyu Song and
                  Wenke Lee},
  editor       = {Sven Dietrich},
  title        = {Diagnosis and Emergency Patch Generation for Integer Overflow Exploits},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {255--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_14},
  doi          = {10.1007/978-3-319-08509-8\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WangSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WestM14,
  author       = {Andrew G. West and
                  Aziz Mohaisen},
  editor       = {Sven Dietrich},
  title        = {Metadata-Driven Threat Classification of Network Endpoints Appearing
                  in Malware},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {152--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_9},
  doi          = {10.1007/978-3-319-08509-8\_9},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WestM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ZhangD14,
  author       = {Xiao Zhang and
                  Wenliang Du},
  editor       = {Sven Dietrich},
  title        = {Attacks on Android Clipboard},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {72--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_5},
  doi          = {10.1007/978-3-319-08509-8\_5},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ZhangD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2014,
  editor       = {Sven Dietrich},
  title        = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8},
  doi          = {10.1007/978-3-319-08509-8},
  isbn         = {978-3-319-08508-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics