


default search action
DIMVA 2012: Heraklion, Crete, Greece
- Ulrich Flegel, Evangelos P. Markatos, William K. Robertson:

Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7591, Springer 2013, ISBN 978-3-642-37299-5
Malware I
- Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu:

Using File Relationships in Malware Classification. 1-20 - Patrick Stewin, Iurii Bystrov:

Understanding DMA Malware. 21-41 - Christian Rossow, Christian J. Dietrich, Herbert Bos

:
Large-Scale Analysis of Malware Downloaders. 42-61
Mobile Security
- Steve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song:

Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. 62-81 - Min Zheng, Patrick P. C. Lee, John C. S. Lui:

ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. 82-101
Malware II
- Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna:

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. 102-122 - Yongzheng Wu, Roland H. C. Yap:

Experiments with Malware Visualization. 123-133 - André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna:

Tracking Memory Writes for Malware Classification and Code Reuse Identification. 134-143
Secure Design
- Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos

:
System-Level Support for Intrusion Recovery. 144-163 - Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou

:
NetGator: Malware Detection Using Program Interactive Challenges. 164-183 - Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz

:
SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines. 184-203
IDS
- Thomas Schreck

, Stefan Berger, Jan Göbel:
BISSAM: Automatic Vulnerability Identification of Office Documents. 204-213 - Karel Bartos, Martin Rehák, Michal Svoboda:

Self-organized Collaboration of Distributed IDS Sensors. 214-231 - Elias Raftopoulos, Matthias Egli, Xenofontas A. Dimitropoulos:

Shedding Light on Log Correlation in Network Forensics Analysis. 232-241

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














