Skip to main content
  • Conference proceedings
  • © 2019

Detection of Intrusions and Malware, and Vulnerability Assessment

16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11543)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2019.

Buy it now

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

    Pages i-xv
  2. Wild Wild Web

    1. Front Matter

      Pages 1-1
    2. Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions

      • Aidan Beggs, Alexandros Kapravelos
      Pages 3-22
    3. New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild

      • Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck
      Pages 23-42
    4. Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting

      • Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis
      Pages 43-66
    5. On the Perils of Leaking Referrers in Online Collaboration Services

      • Beliz Kaleli, Manuel Egele, Gianluca Stringhini
      Pages 67-85
  3. Cyber-Physical Systems

    1. Front Matter

      Pages 87-87
    2. Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems

      • Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba
      Pages 89-108
    3. Overshadow PLC to Detect Remote Control-Logic Injection Attacks

      • Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed
      Pages 109-132
    4. A Security Evaluation of Industrial Radio Remote Controllers

      • Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano et al.
      Pages 133-153
    5. Understanding the Security of Traffic Signal Infrastructure

      • Zhenyu Ning, Fengwei Zhang, Stephen Remias
      Pages 154-174
  4. Malware

    1. Front Matter

      Pages 175-175
    2. Practical Enclave Malware with Intel SGX

      • Michael Schwarz, Samuel Weiser, Daniel Gruss
      Pages 177-196
    3. On Deception-Based Protection Against Cryptographic Ransomware

      • Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra
      Pages 219-239
    4. PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware

      • Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto
      Pages 240-259
  5. Software Security and Binary Analysis

    1. Front Matter

      Pages 261-261
    2. Memory Categorization: Separating Attacker-Controlled Data

      • Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus
      Pages 263-287
    3. TypeMiner: Recovering Types in Binary Programs Using Machine Learning

      • Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck
      Pages 288-308
    4. SAFE: Self-Attentive Function Embeddings for Binary Similarity

      • Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni
      Pages 309-329

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

About this book

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.

The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation. 

Editors and Affiliations

  • University of Georgia, Athens, USA

    Roberto Perdisci

  • University of Rennes, CNRS, IRISA, Rennes, France

    Clémentine Maurice

  • University of Cagliari, Cagliari, Italy

    Giorgio Giacinto

  • Chalmers University of Technology, Gothenburg, Sweden

    Magnus Almgren

Bibliographic Information

Buy it now

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access