語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection of intrusions and malware,...
~
DIMVA (Conference) (2025 :)
FindBook
Google Book
Amazon
博客來
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part I /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Detection of intrusions and malware, and vulnerability assessment/ edited by Manuel Egele ... [et al.].
其他題名:
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
其他題名:
DIMVA 2025
其他作者:
Egele, Manuel.
團體作者:
DIMVA (Conference)
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xv, 297 p. :ill. (some col.), digital ;24 cm.
內容註:
Web Security. -- ScamFerret: Detecting Scam Websites Autonomously with Large Language Models. -- Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network. -- Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering. -- Poster: Generating the WEB-IDS23 Dataset. -- Vulnerability Detection. -- Sourcerer: channeling the void. -- CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection. -- SyzFroge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing. -- Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation. -- Side channels. -- Reverse-Engineering the Address Translation Caches. -- The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer. -- Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP. -- Poster: Extracting Cryptographic Keys from Windows Live Processes. -- Obfuscation. -- Experimental Study of Binary Diffing Resilience on Obfuscated Programs. -- Quantifying and Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement. -- Exploring the Potential of LLMs for Code Deobfuscation. -- Poster: All Right Then, (Don't) Keep Your Secrets: Exposing API Hashing in Malware.
Contained By:
Springer Nature eBook
標題:
Intrusion detection systems (Computer security) - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-97620-9
ISBN:
9783031976209
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part I /
Detection of intrusions and malware, and vulnerability assessment
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.Part I /[electronic resource] :DIMVA 2025edited by Manuel Egele ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xv, 297 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,157471611-3349 ;. - Lecture notes in computer science ;15747..
Web Security. -- ScamFerret: Detecting Scam Websites Autonomously with Large Language Models. -- Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network. -- Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering. -- Poster: Generating the WEB-IDS23 Dataset. -- Vulnerability Detection. -- Sourcerer: channeling the void. -- CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection. -- SyzFroge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing. -- Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation. -- Side channels. -- Reverse-Engineering the Address Translation Caches. -- The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer. -- Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP. -- Poster: Extracting Cryptographic Keys from Windows Live Processes. -- Obfuscation. -- Experimental Study of Binary Diffing Resilience on Obfuscated Programs. -- Quantifying and Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement. -- Exploring the Potential of LLMs for Code Deobfuscation. -- Poster: All Right Then, (Don't) Keep Your Secrets: Exposing API Hashing in Malware.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
ISBN: 9783031976209
Standard No.: 10.1007/978-3-031-97620-9doiSubjects--Topical Terms:
3135747
Intrusion detection systems (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25 / D55 2025
Dewey Class. No.: 005.8
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part I /
LDR
:03241nmm a2200349 a 4500
001
2413743
003
DE-He213
005
20250712073457.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031976209
$q
(electronic bk.)
020
$a
9783031976193
$q
(paper)
024
7
$a
10.1007/978-3-031-97620-9
$2
doi
035
$a
978-3-031-97620-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D55 2025
072
7
$a
UKN
$2
bicssc
072
7
$a
COM043000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D582 2025
111
2
$a
DIMVA (Conference)
$n
(22nd :
$d
2025 :
$c
Graz, Austria)
$3
3790000
245
1 0
$a
Detection of intrusions and malware, and vulnerability assessment
$h
[electronic resource] :
$b
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
$n
Part I /
$c
edited by Manuel Egele ... [et al.].
246
3
$a
DIMVA 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xv, 297 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15747
505
0
$a
Web Security. -- ScamFerret: Detecting Scam Websites Autonomously with Large Language Models. -- Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network. -- Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering. -- Poster: Generating the WEB-IDS23 Dataset. -- Vulnerability Detection. -- Sourcerer: channeling the void. -- CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection. -- SyzFroge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing. -- Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation. -- Side channels. -- Reverse-Engineering the Address Translation Caches. -- The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer. -- Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP. -- Poster: Extracting Cryptographic Keys from Windows Live Processes. -- Obfuscation. -- Experimental Study of Binary Diffing Resilience on Obfuscated Programs. -- Quantifying and Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement. -- Exploring the Potential of LLMs for Code Deobfuscation. -- Poster: All Right Then, (Don't) Keep Your Secrets: Exposing API Hashing in Malware.
520
$a
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
650
0
$a
Intrusion detection systems (Computer security)
$v
Congresses.
$3
3135747
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Crime Control and Security.
$3
3251653
650
2 4
$a
Quantum Physics.
$3
893952
700
1
$a
Egele, Manuel.
$3
3790001
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15747.
$3
3790002
856
4 0
$u
https://doi.org/10.1007/978-3-031-97620-9
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519198
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 D55 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入