Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
46
views
13
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,940
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Detection of Intrusions and Malware, and Vulnerability Assessment
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
other
Author(s):
Sam L. Thomas
,
Flavio D. Garcia
,
Tom Chothia
Publication date
(Online):
June 04 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Digital Science
Most cited references
13
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Experimental Security Analysis of a Modern Automobile
Hovav Shacham
,
Stefan Savage
,
Danny Anderson
…
(2010)
0
comments
Cited
130
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Learning and Classification of Malware Behavior
Konrad Rieck
,
Thorsten Holz
,
Carsten Willems
…
(2008)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Cross-Architecture Bug Search in Binary Executables
Jannik Pewny
,
Behrad Garmany
,
Robert Gawlik
…
(2015)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
June 04 2017
Pages
: 279-300
DOI:
10.1007/978-3-319-60876-1_13
SO-VID:
682fd63a-3372-4fdd-8d14-809da8955a7e
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Malware Guard Extension: Using SGX to Conceal Cache Attacks
pp. 25
On the Trade-Offs in Oblivious Execution Techniques
pp. 48
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
pp. 73
Measuring and Defeating Anti-Instrumentation-Equipped Malware
pp. 97
DynODet: Detecting Dynamic Obfuscation in Malware
pp. 119
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
pp. 141
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
pp. 161
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
pp. 209
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
pp. 230
SPEAKER: Split-Phase Execution of Application Containers
pp. 252
Deep Ground Truth Analysis of Current Android Malware
pp. 279
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
pp. 301
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
pp. 325
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
pp. 347
On the Privacy Impacts of Publicly Leaked Password Databases
pp. 366
Unsupervised Detection of APT C&C Channels using Web Request Graphs
pp. 388
Measuring Network Reputation in the Ad-Bidding Process
Similar content
4,940
The past, present and future of humidifier disinfectant-associated interstitial lung diseases in children
Authors:
Eun. Lee
,
So-Yeon Lee
,
Soo-Jong Hong
Characteristics of Exposure to Chloromethylisothiazolinone (CMIT) and Methylisothiazolinone (MIT) among Humidifier Disinfectant-Associated Lung Injury (HDLI) Patients in South Korea
Authors:
Dong-Uk Park
,
Seon-Kyung Park
,
Jiwon Kim
…
Computational prediction of promising pyrazine and bipyridine analogues of a fluorinated MOF platform, MFN-Ni-L (M = SI/AL; N = SIX/FIVE; L = pyr/bipyr), for CO
2
capture under pre-humidified conditions
Authors:
Renjith S. Pillai
,
Cherumuttathu H. Suresh
See all similar
Cited by
4
Challenges in Firmware Re-Hosting, Emulation, and Analysis
Authors:
Christopher (Christopher Alec) Wright
,
William Moeglein
,
Saurabh Bagchi
…
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality
Authors:
Sam L. Thomas
,
Tom Chothia
,
Flavio D. Garcia
Backdoors: Definition, Deniability and Detection
Authors:
Sam Thomas
,
Aurelien Francillon
See all cited by