00908nam0 2200289 i 450 99626784720331620180910120044.0978-88-93912-22-820180214d2017----||||0itac50 baitaengITMagna Carta e rule of law nell'ordinamento inglesea cura di Alessandro TorreNapoliEditoriale scientifica2017210 p.21 cmMarcopolo7Atti del Convegno tenuto a Napoli nel 2015Marcopolo7Magna charta libertatumAtti di congressiBNCF342.41029TORRE,Alessandro<1957- >ITsalbcISBD996267847203316XXIV.2.M. 45988049 G.XXIV.2.M.416050BKGIUMagna Carta e rule of law nell'ordinamento inglese1511414UNISA04628nam 22008175 450 991041344530332120251225183441.03-030-52683-610.1007/978-3-030-52683-2(CKB)4100000011343331(DE-He213)978-3-030-52683-2(MiAaPQ)EBC6270546(PPN)255011989(EXLCZ)99410000001134333120200703d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDetection of Intrusions and Malware, and Vulnerability Assessment 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings /edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) Security and Cryptology,2946-1863 ;12223Includes index.3-030-52682-8 Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.Security and Cryptology,2946-1863 ;12223Data protectionComputer networksComputer engineeringCryptographyData encryption (Computer science)Software engineeringComputersLaw and legislationInformation technologyLaw and legislationData and Information SecurityComputer Communication NetworksComputer Engineering and NetworksCryptologySoftware EngineeringLegal Aspects of ComputingData protection.Computer networks.Computer engineering.Cryptography.Data encryption (Computer science).Software engineering.ComputersLaw and legislation.Information technologyLaw and legislation.Data and Information Security.Computer Communication Networks.Computer Engineering and Networks.Cryptology.Software Engineering.Legal Aspects of Computing.005.8005.8Maurice Clémentineedthttp://id.loc.gov/vocabulary/relators/edtBilge Leylaedthttp://id.loc.gov/vocabulary/relators/edtStringhini Gianlucaedthttp://id.loc.gov/vocabulary/relators/edtNeves Nunoedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910413445303321Detection of Intrusions and Malware, and Vulnerability Assessment3395207UNINA