Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
36
views
0
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,361
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Detection of Intrusions and Malware, and Vulnerability Assessment
other
Editor(s):
Michalis Polychronakis
,
Michael Meier
Publication date
(Print):
2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Metrics and Research Assessment
Author and book information
Book
ISBN (Print):
978-3-319-60875-4
ISBN (Electronic):
978-3-319-60876-1
Publication date (Print):
2017
DOI:
10.1007/978-3-319-60876-1
SO-VID:
f32f0661-5b11-401a-899f-3d0848f04e55
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Malware Guard Extension: Using SGX to Conceal Cache Attacks
pp. 25
On the Trade-Offs in Oblivious Execution Techniques
pp. 48
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
pp. 73
Measuring and Defeating Anti-Instrumentation-Equipped Malware
pp. 97
DynODet: Detecting Dynamic Obfuscation in Malware
pp. 119
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
pp. 141
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
pp. 161
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
pp. 209
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
pp. 230
SPEAKER: Split-Phase Execution of Application Containers
pp. 252
Deep Ground Truth Analysis of Current Android Malware
pp. 279
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
pp. 301
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
pp. 325
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
pp. 347
On the Privacy Impacts of Publicly Leaked Password Databases
pp. 366
Unsupervised Detection of APT C&C Channels using Web Request Graphs
pp. 388
Measuring Network Reputation in the Ad-Bidding Process
Similar content
5,361
Universal backdoor attack on deep neural networks for malware detection
Authors:
Yunchun Zhang
,
Fan Feng
,
Zikun Liao
…
Evading Anti-malware Engines with Deep Reinforcement Learning
Authors:
Zhiyang Fang
,
Junfeng Wang
,
Boya Li
…
Toward Identifying APT Malware through API System Calls
Authors:
Chaoxian Wei
,
Qiang Li
,
Dong Guo
…
See all similar
Cited by
4
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs
Authors:
Mordechai Guri
,
Boris Zadov
,
Dima Bykhovsky
…
A characterisation of system-wide propagation in the malware landscape
Authors:
David Korczynski
Fidelius: Protecting User Secrets from Compromised Browsers
Authors:
Jonathan Cogan
,
Saba Eskandarian
,
Dillon Franke
…
See all cited by