標(biāo)題: Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 12th International C Magnus Almgren,Vincenzo Gulisano,Federico Maggi Con [打印本頁(yè)] 作者: 小費(fèi) 時(shí)間: 2025-3-21 19:29
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment影響因子(影響力)
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment影響因子(影響力)學(xué)科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment網(wǎng)絡(luò)公開度
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment被引頻次
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment被引頻次學(xué)科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment年度引用
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment年度引用學(xué)科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment讀者反饋
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment讀者反饋學(xué)科排名
作者: catagen 時(shí)間: 2025-3-21 22:25
“Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Themrst large-scale analysis of bootkit technology, covering 2,424 bootkit samples on Windows 7 and XP over the past 8 years. From the analysis, we derive a core set of fundamental properties that hold for all bootkits on these systems and result in abnormalities during the system’s boot process. Based 作者: olfction 時(shí)間: 2025-3-22 02:34
C5: Cross-Cores Cache Covert Channel hardware induces threats. Covert channels were demonstrated to violate isolation and, typically, allow data exfiltration. Several covert channels have been proposed that rely on the processor’s cache. However, these covert channels are either slow or impractical due to the .. This uncertainty exist作者: 漂亮才會(huì)豪華 時(shí)間: 2025-3-22 07:46
Intrusion Detection for Airborne Communication Using PHY-Layer Informationneration of air traffic management systems is required. Recent articles in the academic and hacker community highlight crucial security challenges faced by integral parts of these next generation protocols, with the most dangerous attacks based on classic message injection. In this article, we analy作者: 我不明白 時(shí)間: 2025-3-22 09:07
That Ain’t You: Blocking Spearphishing Through Behavioral Modellingent by one of the victim’s coworkers or business partners, but has instead been crafted by the attacker. A particularly insidious type of spearphishing emails are the ones that do not only claim to be written by a certain person, but are also sent by that person’s email account, which has been compr作者: 彩色 時(shí)間: 2025-3-22 13:25 作者: 彩色 時(shí)間: 2025-3-22 18:40 作者: Judicious 時(shí)間: 2025-3-22 23:14
Fine-Grained Control-Flow Integrity Through Binary Hardeninghrough memory corruption despite all currently deployed defenses. Control-Flow Integrity (CFI) is a promising security property that restricts indirect control-flow transfers to a static set of well-known locations..We present Lockdown, a modular, fine-grained CFI policy that protects binary-only ap作者: LAITY 時(shí)間: 2025-3-23 01:56 作者: 舊石器時(shí)代 時(shí)間: 2025-3-23 09:20
The Role of Cloud Services in Malicious Software: Trends and Insightsrvers to distribute malware, C&C servers to manage infected terminals, redirectors to increase anonymity, and drop zones to host stolen data..We conduct a large scale analysis of all the malware samples submitted to the Anubis malware analysis system between 2008 and 2014. For each sample, we extrac作者: 排出 時(shí)間: 2025-3-23 12:26
Capturing DDoS Attack Dynamics Behind the Scenesheir strategies are more sophisticated to escape from detection. Effective defenses demand in-depth understanding of such strategies. In this paper, we set to investigate the DDoS landscape from the perspective of the attackers. We focus on the dynamics of the attacking force, aiming to explore the 作者: EWER 時(shí)間: 2025-3-23 16:17 作者: calorie 時(shí)間: 2025-3-23 19:21
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations variety of attacks, many embodiments of this standard allow these protections to be optionally implemented. In this paper, we analyze the extent to which one particularly dangerous vulnerability, Cross Site Request Forgery, exists in real-world deployments. We crawl the Alexa Top 10,000 domains, an作者: 制定 時(shí)間: 2025-3-24 01:15
May I? - Content Security Policy Endorsement for Browser Extensionsnse-in-depth” Content Security Policy (CSP) to mitigate the effects of XSS attacks. However, the adoption of CSP has been frustratingly slow. This paper focuses on a particular roadblock for wider adoption of CSP: its interplay with browser extensions..We report on a large-scale empirical study of a作者: Muscularis 時(shí)間: 2025-3-24 04:23 作者: PALMY 時(shí)間: 2025-3-24 08:39 作者: 熱情的我 時(shí)間: 2025-3-24 14:05 作者: 破譯 時(shí)間: 2025-3-24 16:52
Geisteswissenschaftliche P?dagogikze the possibility and effectiveness of detecting such attacks on critical air traffic infrastructures with a single receiver based on physical layer information. Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40?s.作者: ODIUM 時(shí)間: 2025-3-24 21:48 作者: 惡意 時(shí)間: 2025-3-25 02:07 作者: Dislocation 時(shí)間: 2025-3-25 06:50 作者: Sigmoidoscopy 時(shí)間: 2025-3-25 09:24 作者: CHIP 時(shí)間: 2025-3-25 14:13 作者: Basal-Ganglia 時(shí)間: 2025-3-25 19:26
Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metricsverage detection rate of 98.01?% and a false positive rate of 0.48?%. Moreover, we show that our approach is able to detect new malware (i.e. samples from malware families not included in the training set) and that the consideration of quantities in itself significantly improves detection precision.作者: 格子架 時(shí)間: 2025-3-25 23:50
Fine-Grained Control-Flow Integrity Through Binary Hardening-grained CFI checks using information from a trusted dynamic loader. A shadow stack enforces precise integrity for function returns. Our prototype implementation shows that Lockdown results in low performance overhead and a security analysis discusses any remaining gadgets.作者: 相符 時(shí)間: 2025-3-26 02:25 作者: arthroplasty 時(shí)間: 2025-3-26 06:33 作者: 牽連 時(shí)間: 2025-3-26 11:06 作者: Aromatic 時(shí)間: 2025-3-26 14:25 作者: optional 時(shí)間: 2025-3-26 20:37
Capturing DDoS Attack Dynamics Behind the Scenesattack strategies, if any. Our study is based on 50,704 different Internet DDoS attacks. Our results indicate that attackers deliberately schedule their controlled bots in a dynamic fashion, and such dynamics can be well captured by statistical distributions.作者: 宇宙你 時(shí)間: 2025-3-26 22:58 作者: 珠寶 時(shí)間: 2025-3-27 03:43 作者: blister 時(shí)間: 2025-3-27 05:53 作者: 我吃花盤旋 時(shí)間: 2025-3-27 12:09 作者: 小臼 時(shí)間: 2025-3-27 17:08 作者: homeostasis 時(shí)間: 2025-3-27 20:10 作者: 圣人 時(shí)間: 2025-3-27 22:10 作者: Cocker 時(shí)間: 2025-3-28 04:22
The Role of Cloud Services in Malicious Software: Trends and Insightss reveal that cyber-criminals sustain long-lived operations through the use of public cloud resources, either as a redundant or a major component of their malware infrastructures. We also observe that the number of malicious and dedicated cloud-based domains has increased almost 4 times between 2010作者: GROWL 時(shí)間: 2025-3-28 08:07 作者: 騷動(dòng) 時(shí)間: 2025-3-28 10:58 作者: 啟發(fā) 時(shí)間: 2025-3-28 17:57
Geisteswissenschaften in der Offensiveme processor. The covert channel targets the last level cache that is shared across all cores. It exploits the inclusive feature of caches, allowing a core to evict lines in the private first level cache of another core. We experimentally evaluate the covert channel in native and virtualized environ作者: sphincter 時(shí)間: 2025-3-28 21:45
Neuere Geschichte der P?dagogikpearphishing has very different characteristics from spam and even traditional phishing. To fight the spearphishing threat, we propose a change of focus in the techniques that we use for detecting malicious emails: instead of looking for features that are indicative of attack emails, we look for ema作者: 不如樂(lè)死去 時(shí)間: 2025-3-29 02:55 作者: 宮殿般 時(shí)間: 2025-3-29 06:20
Geisteswissenschaftliche P?dagogikr AVs, when handling malicious and benign applications, and the resulting energy consumption. Even though we focus on energy consumption, we also explore other dimensions such as the discrepancies between scanning modes, the impact of file size and scan duration. We then translate our findings into 作者: hypotension 時(shí)間: 2025-3-29 10:21 作者: Incorporate 時(shí)間: 2025-3-29 13:50
https://doi.org/10.1007/978-3-7091-5143-3et a different demographics on the site, and therefore set up accounts with different characteristics. Our results shed light on the threats associated to online dating scams, and can help researchers and practitioners in developing effective countermeasures to fight them.作者: 解脫 時(shí)間: 2025-3-29 19:24 作者: 表主動(dòng) 時(shí)間: 2025-3-29 22:33
Detection of Intrusions and Malware, and Vulnerability Assessment978-3-319-20550-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Breach 時(shí)間: 2025-3-30 01:44
https://doi.org/10.1007/978-3-319-20550-2Anomaly detection; Application security; Bootkits; Cloud computing; Denial-of-service attacks; Domain-spe作者: Hemoptysis 時(shí)間: 2025-3-30 04:02 作者: defibrillator 時(shí)間: 2025-3-30 09:30
Technik, Wirtschaft und Politikovide a holistic view on how ransomware attacks have evolved during this period by analyzing 1,359 samples that belong to 15 different ransomware families. Our results show that, despite a continuous improvement in the encryption, deletion, and communication techniques in the main ransomware familie作者: GRACE 時(shí)間: 2025-3-30 15:28 作者: nonradioactive 時(shí)間: 2025-3-30 18:54
Geisteswissenschaften in der Offensive hardware induces threats. Covert channels were demonstrated to violate isolation and, typically, allow data exfiltration. Several covert channels have been proposed that rely on the processor’s cache. However, these covert channels are either slow or impractical due to the .. This uncertainty exist作者: Toxoid-Vaccines 時(shí)間: 2025-3-30 20:44 作者: thrombosis 時(shí)間: 2025-3-31 03:05
Neuere Geschichte der P?dagogikent by one of the victim’s coworkers or business partners, but has instead been crafted by the attacker. A particularly insidious type of spearphishing emails are the ones that do not only claim to be written by a certain person, but are also sent by that person’s email account, which has been compr作者: semiskilled 時(shí)間: 2025-3-31 05:42 作者: fledged 時(shí)間: 2025-3-31 10:43
Neuere Geschichte der P?dagogikware-analysis community—and static patterns—known as signatures in the antivirus community. Such patterns are often part of the skill set of the analyst, sometimes implemented in manually-created post-processing scripts. It would be desirable to be able to automatically find such behaviors, present 作者: growth-factor 時(shí)間: 2025-3-31 15:06
https://doi.org/10.1007/978-3-658-21930-7hrough memory corruption despite all currently deployed defenses. Control-Flow Integrity (CFI) is a promising security property that restricts indirect control-flow transfers to a static set of well-known locations..We present Lockdown, a modular, fine-grained CFI policy that protects binary-only ap作者: 過(guò)時(shí) 時(shí)間: 2025-3-31 19:53
Geisteswissenschaftliche P?dagogikrgy. Modern smartphones, with their plethora of application scenarios and usage habits, are setting new challenges and constraints for malware detection software. Among these challenges, preserving the battery life as much as possible is one of the most pressing. From the end users’ perspective, a s