Research in Attacks, Intrusions, and Defenses
Springer International Publishing (Verlag)
978-3-319-66331-9 (ISBN)
The 21 revised full papers were selected from 105 submissions. They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.
VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices.- Static Program Analysis as a Fuzzing Aid.- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.- Lens on the endpoint: Hunting for malicious software through endpoint data analysis.- Redemption: Real-time Protection Against Ransomware at End-Hosts.- ILAB: An Interactive Labelling Strategy for Intrusion Detection.- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps.- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level.- Android Malware Clustering through Malicious Payload Mining.- Stealth Loader: Trace-free Program Loading for API Obfuscation.- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers .- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.-BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems.- Trapped by the UI: The Android case.- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.- Secure In-Cache Execution.- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.- Linking Amplification DDoS Attacks to Booter Services.- Practical and Accurate Runtime Application Protection against DoS Attacks.- Exploring the ecosystem of malicious domain registrations in the .eu TLD.
Erscheinungsdatum | 05.10.2017 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 496 p. 115 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 766 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | android security • Applications • Applied Computing • Clustering • computer crime • Computer Networks • Computer Science • Computer Security • conference proceedings • cryptography • cybercrime • Data Security • Informatics • Informatik • Internet • Intrusion Detection • Malware • Network Security • Operating Systems • Programming Languages • Research • security • Software Security • systems and data security • telecommunication traffic • vulnerability analysis |
ISBN-10 | 3-319-66331-3 / 3319663313 |
ISBN-13 | 978-3-319-66331-9 / 9783319663319 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich