default search action
21st DIMVA 2024: Lausanne, Switzerland
- Federico Maggi, Manuel Egele, Mathias Payer, Michele Carminati:
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings. Lecture Notes in Computer Science 14828, Springer 2024, ISBN 978-3-031-64170-1
Vulnerability Detection and Defense
- Joshua A. Bockenek, Freek Verbeek, Binoy Ravindran:
Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries. 3-22 - Ruizhe Wang, Meng Xu, N. Asokan:
S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More. 23-43 - Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik:
Acoustic Side-Channel Attacks on a Computer Mouse. 44-63 - Lukas Kree, René Helmke, Eugen Winter:
Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study. 64-83 - Sofiane Benahmed, Abdullah Qasem, Anis Lounis, Mourad Debbabi:
Modularizing Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. 84-103
Malware and Threats
- Mohammad Ali Tofighi, Behzad Ousat, Javad Zandi, Esteban Schafir, Amin Kharraz:
Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks. 107-127 - Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero:
Tarallo: Evading Behavioral Malware Detectors in the Problem Space. 128-149 - Cristian Assaiante, Simone Nicchi, Daniele Cono D'Elia, Leonardo Querzoni:
Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. 150-173 - Alexandre D'Hondt, Charles-Henry Bertrand Van Ouytsel, Axel Legay:
Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. 174-183 - Moritz Pfister, Robert Michael, Max Boll, Cosima Körfer, Konrad Rieck, Daniel Arp:
Listening Between the Bits: Privacy Leaks in Audio Fingerprints. 184-204
Mobile and Web Application Security
- Sebastian Neef, Maath Oudeh:
Bringing UFUs Back into the Air with FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners. 207-226 - Vivin Paliath, Erik Trickel, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables. 227-250 - Dolière Francis Somé:
Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps. 251-260 - Michele Marazzi, Patrick Jattke, Jason Zibung, Kaveh Razavi:
PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. 261-282 - Billy Tsouvalas, Nick Nikiforakis:
Knocking on Admin's Door: Protecting Critical Web Applications with Deception. 283-306
AI for Security
- Suguru Horimoto, Keane Lucas, Lujo Bauer:
Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. 309-329 - Zsolt Levente Kucsván, Marco Caselli, Andreas Peter, Andrea Continella:
Inferring Recovery Steps from Cyber Threat Intelligence Reports. 330-349 - Trevor Dunlap, John Speed Meyers, Bradley Reaves, William Enck:
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. 350-369 - Arian Soltani, D'Jeff K. Nkashama, Jordan F. Masakuna, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza:
Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity. 370-380 - Arthur Drichel, Benedikt von Querfurth, Ulrike Meyer:
Extended Abstract: A Transfer Learning-Based Training Approach for DGA Classification. 381-391
Hardware and Firmware Security
- Anis Lounis, Anthony Andreoli, Mourad Debbabi, Aiman Hanna:
Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics. 395-415 - Ruben Mechelinck, Daniel Dorfmeister, Bernhard Fischer, Stijn Volckaert, Stefan Brunthaler:
GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. 416-438 - Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori:
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key. 439-459 - Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, Daniel Gruss:
Presshammer: Rowhammer and Rowpress Without Physical Address Information. 460-479
Cyber Physical Systems and IoT
- Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi:
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. 483-502 - Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. 503-524 - Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L. R. Olivier, Romain Cayre, Mohamed Kaâniche:
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit. 525-544 - Sine Canbolat, Clemens Fruböse, Ghada Elbez, Veit Hagenmeyer:
Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids. 545-555
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.