04985nam 22007575 450 99641828950331620200703160002.03-030-52683-610.1007/978-3-030-52683-2(CKB)4100000011343331(DE-He213)978-3-030-52683-2(MiAaPQ)EBC6270546(PPN)255011989(EXLCZ)99410000001134333120200703d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDetection of Intrusions and Malware, and Vulnerability Assessment[electronic resource] 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings /edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) Security and Cryptology ;12223Includes index.3-030-52682-8 Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.Security and Cryptology ;12223Computer securityComputersComputer organizationData encryption (Computer science)Software engineeringLaw and legislationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computer security.Computers.Computer organization.Data encryption (Computer science).Software engineering.Law and legislation.Systems and Data Security.Information Systems and Communication Service.Computer Systems Organization and Communication Networks.Cryptology.Software Engineering/Programming and Operating Systems.Legal Aspects of Computing.005.8Maurice Clémentineedthttp://id.loc.gov/vocabulary/relators/edtBilge Leylaedthttp://id.loc.gov/vocabulary/relators/edtStringhini Gianlucaedthttp://id.loc.gov/vocabulary/relators/edtNeves Nunoedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418289503316Detection of Intrusions and Malware, and Vulnerability Assessment2071230UNISA