Skip to main content
  • Conference proceedings
  • © 2018

Detection of Intrusions and Malware, and Vulnerability Assessment

15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10885)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2018.

Buy it now

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

    Pages I-XII
  2. Malware Analysis

    1. Front Matter

      Pages 1-1
    2. Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis

      • Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt
      Pages 3-23
    3. MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps

      • Michael Brengel, Christian Rossow
      Pages 24-45Open Access
    4. Spearphishing Malware: Do We Really Know the Unknown?

      • Yanko Baychev, Leyla Bilge
      Pages 46-66
  3. Mobile and Embedded Security

    1. Front Matter

      Pages 67-67
    2. Honey, I Shrunk Your App Security: The State of Android App Hardening

      • Vincent Haupert, Dominik Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller
      Pages 69-91
    3. GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM

      • Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel et al.
      Pages 92-113
    4. BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices

      • Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang et al.
      Pages 114-138
  4. Attacks

    1. Front Matter

      Pages 139-139
    2. Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats

      • Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee
      Pages 141-161
    3. Evasive Malware via Identifier Implanting

      • Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama et al.
      Pages 162-184Open Access
    4. On the Weaknesses of Function Table Randomization

      • Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz
      Pages 185-207
  5. Detection and Containment

    1. Front Matter

      Pages 209-209
    2. FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds

      • Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero
      Pages 211-233
    3. No Random, No Ransom: A Key to Stop Cryptographic Ransomware

      • Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
      Pages 234-255
    4. Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception

      • Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
      Pages 256-278
  6. Web and Browser Security

    1. Front Matter

      Pages 279-279
    2. JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript

      • Aurore Fass, Robert P. Krawczyk, Michael Backes, Ben Stock
      Pages 303-325

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

About this book

This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.

Editors and Affiliations

  • Vrije Universiteit Amsterdam, Amsterdam, The Netherlands

    Cristiano Giuffrida

  • CEA, Palaiseau, France

    Sébastien Bardin

  • Université Paris-Saclay, Evry, France

    Gregory Blanc

Bibliographic Information

  • Book Title: Detection of Intrusions and Malware, and Vulnerability Assessment

  • Book Subtitle: 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings

  • Editors: Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-93411-2

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Switzerland AG 2018

  • Softcover ISBN: 978-3-319-93410-5Published: 08 June 2018

  • eBook ISBN: 978-3-319-93411-2Published: 21 June 2018

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XII, 405

  • Number of Illustrations: 93 b/w illustrations

  • Topics: Systems and Data Security, Operating Systems, Legal Aspects of Computing, Computers and Society

Buy it now

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access