


default search action
22nd DIMVA 2025: Graz, Austria - Part I
- Manuel Egele

, Veelasha Moonsamy
, Daniel Gruss
, Michele Carminati
:
Detection of Intrusions and Malware, and Vulnerability Assessment - 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15747, Springer 2025, ISBN 978-3-031-97619-3
Web Security
- Hiroki Nakano, Takashi Koide, Daiki Chiba

:
ScamFerret: Detecting Scam Websites Autonomously with Large Language Models. 3-25 - Neriya Mazzuz, Asaf Shabtai:

Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network. 26-45 - Yunsen Lei, Craig A. Shue:

Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering. 46-65 - Eric Lanfer

, Dominik Brockmann
, Nils Aschenbruck
:
Poster: Generating the WEB-IDS23 Dataset. 66-72
Vulnerability Detection
- Nicolas Badoux, Flavio Toffalini, Mathias Payer:

Sourcerer: Channeling the void. 75-95 - Saquib Irtiza, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Latifur Khan:

CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection. 96-117 - ZhiZhuo Tang, Jian Lin, Weiyu Dong, Hang Ma, Tieming Liu:

SyzForge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing. 118-139 - Gianpietro Castiglione, Marcello Maugeri, Giampaolo Bella:

Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation. 140-145
Side Channels
- Philipp Ertmer, Robbie Dumitru

, Yuval Yarom:
Reverse-Engineering the Address Translation Caches. 149-168 - Jonas Juffinger

, Hannes Weissteiner
, Thomas Steinbauer
, Daniel Gruss
:
The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer. 169-190 - Lukas Giner

, Sudheendra Raghav Neela
, Daniel Gruss
:
Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP. 191-212 - León Abascal, Ricardo J. Rodríguez

:
Poster: Extracting Cryptographic Keys from Windows Live Processes. 213-219
Obfuscation
- Roxane Cohen, Robin David, Riccardo Mori, Florian Yger, Fabrice Rossi:

Experimental Study of Binary Diffing Resilience on Obfuscated Programs. 223-243 - Luke Dramko, Deniz Bölöni-Turgut

, Claire Le Goues, Edward J. Schwartz:
Quantifying and Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement. 244-266 - David Beste, Grégoire Menguy

, Hossein Hajipour
, Mario Fritz
, Antonio Emanuele Cinà
, Sébastien Bardin
, Thorsten Holz
, Thorsten Eisenhofer
, Lea Schönherr
:
Exploring the Potential of LLMs for Code Deobfuscation. 267-286 - Nicola Bottura

, Giorgia Di Pietro, Yuya Yamada, Daniele Cono D'Elia, Leonardo Querzoni:
Poster: All Right Then, (Don't) Keep Your Secrets: Exposing API Hashing in Malware. 287-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














