Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings: Lecture Notes in Computer Science, cartea 11543
Editat de Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgrenen Limba Engleză Paperback – 6 iun 2019
The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 461.83 lei - 20%
Preț: 461.57 lei - 20%
Preț: 424.26 lei - 20%
Preț: 390.69 lei - 20%
Preț: 498.50 lei - 15%
Preț: 388.50 lei - 20%
Preț: 390.35 lei - 20%
Preț: 460.98 lei - 20%
Preț: 461.52 lei - 20%
Preț: 497.55 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.83 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 391.14 lei - 20%
Preț: 389.85 lei - 20%
Preț: 461.32 lei - 20%
Preț: 498.32 lei - 20%
Preț: 496.64 lei - 20%
Preț: 532.28 lei - 20%
Preț: 527.36 lei - 20%
Preț: 498.46 lei - 15%
Preț: 461.85 lei - 20%
Preț: 390.12 lei - 20%
Preț: 532.41 lei - 20%
Preț: 462.24 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 252.15 lei - 20%
Preț: 390.94 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.86 lei - 20%
Preț: 532.54 lei - 20%
Preț: 462.67 lei - 20%
Preț: 461.65 lei - 20%
Preț: 639.72 lei - 20%
Preț: 255.91 lei - 15%
Preț: 535.92 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 499.36 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.20 lei - 20%
Preț: 249.95 lei
Preț: 467.07 lei
Preț vechi: 583.84 lei
-20% Nou
Puncte Express: 701
Preț estimativ în valută:
82.65€ • 96.92$ • 72.58£
82.65€ • 96.92$ • 72.58£
Carte tipărită la comandă
Livrare economică 30 ianuarie-13 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030220372
ISBN-10: 3030220370
Pagini: 420
Ilustrații: XV, 504 p. 220 illus., 105 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.72 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030220370
Pagini: 420
Ilustrații: XV, 504 p. 220 illus., 105 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.72 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Wild Wild Web.- Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions.- New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild.- Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting.- On the Perils of Leaking Referrers in Online Collaboration Services.- Cyber-Physical Systems.- Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.- Overshadow PLC to Detect Remote Control-Logic Injection Attacks.- A Security Evaluation of Industrial Radio Remote Controllers.- Understanding the Security of Traffic Signal Infrastructure.- Malware.- Practical Enclave Malware with Intel SGX.- How does Malware Use RDTSC? A Study on Operations Executed by Malware for CPU Cycle Measurement.- On Deception-Based Protection Against Cryptographic Ransomware.- PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware.- Software Security and Binary Analysis.- Memory Categorization: Separating Attacker-Controlled Data.- TypeMiner: Recovering Types in Binary Programs using Machine Learning.- SAFE: Self-Attentive Function Embeddings for Binary Similarity.- Triggerflow: Regression Testing by Advanced Execution Path Inspection.- Network Security.- Large-scale Analysis of Infrastructure-leaking DNS Servers.- Security In Plain TXT: Observing the Use of DNS TXT Records in the Wild.- No Need to Marry to Change Your Name!
Attacking Profinet IO Automation Networks Using DCP.- DPX: Data-Plane eXtensions for SDN Security Service Instantiation.- Attack Mitigation.- Practical Password Hardening based on TLS.- Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.- BinTrimmer: Towards Static Binary Debloating through Abstract Interpretation.
Attacking Profinet IO Automation Networks Using DCP.- DPX: Data-Plane eXtensions for SDN Security Service Instantiation.- Attack Mitigation.- Practical Password Hardening based on TLS.- Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.- BinTrimmer: Towards Static Binary Debloating through Abstract Interpretation.