default search action
20th DIMVA 2023: Hamburg, Germany
- Daniel Gruss, Federico Maggi, Mathias Fischer, Michele Carminati:
Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings. Lecture Notes in Computer Science 13959, Springer 2023, ISBN 978-3-031-35503-5
Side Channels Attacks
- Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth:
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. 3-23 - Marina Botvinnik, Tomer Laor, Thomas Rokicki, Clémentine Maurice, Yossi Oren:
The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption. 24-45 - Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV. 46-66
Security and Machine Learning
- Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth:
Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection. 69-88 - Fangyi Yu, Miguel Vargas Martin:
Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models. 89-108
Cyber Physical System Security
- Alessandro Erba, Nils Ole Tippenhauer:
White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems. 111-131 - Marco Balduzzi, Francesco Sortino, Fabio Castello, Leandro Pierguidi:
A Security Analysis of CNC Machines in Industry 4.0. 132-152
Security Issues When Dealing with Users
- Kevin van Liebergen, Juan Caballero, Platon Kotzias, Chris Gates:
A Deep Dive into the VirusTotal File Feed. 155-176 - Yunsen Lei, Julian P. Lanson, Craig A. Shue, Timothy W. Wood:
Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities. 177-197
Analysis of Vulnerable Code
- René Helmke, Johannes vom Dorp:
Extended Abstract: Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses. 201-210 - Linus Hafkemeyer, Jerre Starink, Andrea Continella:
Divak: Non-invasive Characterization of Out-of-Bounds Write Vulnerabilities. 211-232
Flow Integrity and Security
- Anni Peng, Dongliang Fang, Wei Zhou, Erik van der Kouwe, Yin Li, Yuqing Zhang:
CEFI: Command Execution Flow Integrity for Embedded Devices. 235-255 - Alessandro Bertani, Marco Bonelli, Lorenzo Binosi, Michele Carminati, Stefano Zanero, Mario Polino:
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation. 256-275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.