


default search action
22nd DIMVA 2025: Graz, Austria - Part II
- Manuel Egele

, Veelasha Moonsamy
, Daniel Gruss
, Michele Carminati
:
Detection of Intrusions and Malware, and Vulnerability Assessment - 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15748, Springer 2025, ISBN 978-3-031-97622-3
AI/ML and Security
- Jayesh Tripathi

, Heitor Murilo Gomes
, Marcus Botacin:
Towards Explainable Drift Detection and Early Retrain in ML-Based Malware Detection Pipelines. 3-24 - Konstantina Papafragkaki, Giorgos Vasiliadis:

InferONNX: Practical and Privacy-Preserving Machine Learning Inference Using Trusted Execution Environments. 25-43 - Saman Pordanesh, Sufiyan Bukhari

, Benjamin Tan
, Lorenzo De Carli
:
Hiding in Plain Sight: On the Robustness of AI-Generated Code Detection. 44-64 - Xiaolong Wu, Aravind Kumar Machiry, Yung-Hsiang Lu, Dave Jing Tian:

FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. 65-85 - Tomás Pelayo-Benedet

, Ricardo J. Rodríguez
, Carlos Hernandez Gañán
:
Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. 86-92 - Asfa Khalid, Seán Óg Murphy

, Cormac J. Sreenan
, Utz Roedig
:
Poster: Using Machine Learning to Infer Network Structure from Security Metadata. 93-99
Android and Patches
- Norah Ridley, Enrico Branca

, Natalia Stakhanova:
More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. 103-123 - Shiyu Sun, Yunlong Xing, Grant Zou, Xinda Wang, Kun Sun:

An Empirical Study of Multi-language Security Patches in Open Source Software. 124-146 - Jumana, Parjanya Vyas, Yousra Aafer:

Red Light for Security: Uncovering Auto Feature Check and Access Control Gaps in AAOS. 147-166 - Roberto Rossini, Simeone Pizzi, Samuele Doria, Mauro Conti, Eleonora Losiouk:

Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. 167-172
OS and Network
- Ruiyi Zhang, Tristan Hornetz

, Lukas Gerlach, Michael Schwarz:
Taming the Linux Memory Allocator for Rapid Prototyping. 175-194 - Lorenzo Bossi

, Daniele Mammone, Michele Carminati
, Stefano Zanero, Stefano Longari:
Linux Hurt Itself in Its Confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. 195-215 - Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier:

Overlapping Data in Network Protocols: Bridging OS and NIDS Reassembly Gap. 216-236 - Marco Calavaro, Pasquale Caporaso, Luca Capotombolo, Giuseppe Bianchi, Francesco Quaglia:

Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. 237-242 - Nicola Stauffer

, Gürkan Gür:
Poster: Referencing Your Privileges - A Data-Only Exploit Technique for the Windows Kernel. 243-249
Resilient Systems
- Marco Di Gennaro

, Mario D'Onghia, Mario Polino, Stefano Zanero, Michele Carminati
:
PackHero: A Scalable Graph-Based Approach for Efficient Packer Identification. 253-274 - Nicola Ruaro, Fabio Gritti, Robert McLaughlin, Dongyu Meng, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:

A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. 275-296 - Moritz Waser

, David Schrammel, Robert Schilling
, Stefan Mangard
:
FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. 297-315 - Ryan Binder

, Joshua Byun, Dane Brown
, T. Owens Walker
, Jennie Hill
:
Poster: Building Confidence in Hardware-Based Ransomware Detection Through Hardware Performance Counter Event Correlation. 316-322 - Gabriele Digregorio, Francesco Bleggi, Federico Caroli, Michele Carminati

, Stefano Zanero, Stefano Longari:
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning. 323-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














