Advertisement

Detection of Intrusions and Malware, and Vulnerability Assessment

12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

  • Magnus Almgren
  • Vincenzo Gulisano
  • Federico Maggi

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9148)

Also part of the Security and Cryptology book sub series (LNSC, volume 9148)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Attacks

    1. Front Matter
      Pages 1-1
    2. Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda
      Pages 3-24
    3. Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos
      Pages 25-45
    4. Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon
      Pages 46-64
  3. Attack Detection

    1. Front Matter
      Pages 65-65
    2. Martin Strohmeier, Vincent Lenders, Ivan Martinovic
      Pages 67-77
    3. Gianluca Stringhini, Olivier Thonnard
      Pages 78-97
    4. Tobias Wüchner, Martín Ochoa, Alexander Pretschner
      Pages 98-118
  4. Binary Analysis and Mobile Malware Protection

    1. Front Matter
      Pages 119-119
    2. Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero
      Pages 121-143
    3. Mathias Payer, Antonio Barresi, Thomas R. Gross
      Pages 144-164
    4. Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis
      Pages 165-184
  5. Social Networks and Large-Scale Attacks

    1. Front Matter
      Pages 185-185
    2. Xiao Han, Nizar Kheir, Davide Balzarotti
      Pages 187-204
    3. An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen
      Pages 205-215
    4. JingMin Huang, Gianluca Stringhini, Peng Yong
      Pages 216-236
  6. Web and Mobile Security

    1. Front Matter
      Pages 237-237
    2. Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin Butler
      Pages 239-260
    3. Daniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld
      Pages 261-281
    4. Yanick Fratantonio, Antonio Bianchi, William Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda et al.
      Pages 282-303
  7. Provenance and Data Sharing

    1. Front Matter
      Pages 305-305
    2. Yuan Yang, Zhongmin Cai, Weixuan Mao, Zhihai Yang
      Pages 307-326
    3. Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito
      Pages 327-349
  8. Back Matter
    Pages 351-351

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015.
The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

Keywords

Anomaly detection Application security Bootkits Cloud computing Denial-of-service attacks Domain-specific privacy Domain-specific security Information flow control Intrusion detection Malware mitigation Privacy-preserving protocols Reverse engineering Security and privacy Security in hardware Social engineering attacks Social networks Software security System security Web application security

Editors and affiliations

  • Magnus Almgren
    • 1
  • Vincenzo Gulisano
    • 2
  • Federico Maggi
    • 3
  1. 1.Chalmers University of TechnologyGothenburgSweden
  2. 2.Chalmers University of TechnologyGothenburgSweden
  3. 3.Politecnico di MilanoMilanItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-20550-2
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-20549-6
  • Online ISBN 978-3-319-20550-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering