LEADER 04628nam 22008175 450 001 9910413445303321 005 20251225183441.0 010 $a3-030-52683-6 024 7 $a10.1007/978-3-030-52683-2 035 $a(CKB)4100000011343331 035 $a(DE-He213)978-3-030-52683-2 035 $a(MiAaPQ)EBC6270546 035 $a(PPN)255011989 035 $a(EXLCZ)994100000011343331 100 $a20200703d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment $e17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24?26, 2020, Proceedings /$fedited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12223 300 $aIncludes index. 311 08$a3-030-52682-8 327 $aVulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim?s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor. 330 $aThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12223 606 $aData protection 606 $aComputer networks 606 $aComputer engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aSoftware Engineering 606 $aLegal Aspects of Computing 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aSoftware Engineering. 615 24$aLegal Aspects of Computing. 676 $a005.8 676 $a005.8 702 $aMaurice$b Cle?mentine$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBilge$b Leyla$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStringhini$b Gianluca$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNeves$b Nuno$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910413445303321 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$93395207 997 $aUNINA