Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, Dimva 2020, Lisbon, Portugal, June 24-26, 2020, Proc » książka
Vulnerability Discovery and Analysis.- Automated CPE labeling of CVE summaries with Machine Learning.- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective.- Attacks.- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode.- HAEPG: An Automatic Multi-hop Exploitation Generation Framework.- Understanding Android VoIP Security: A System-level Vulnerability Assessment.- Web Security.- Web Runner 2049: Evaluating Third-Party Anti-bot Services.- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers.- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.- On the Security of Application Installers & Online Software Repositories.- Detection and Containment.- Distributed Heterogeneous N-Variant Execution.-Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data.- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.