LEADER 04066nam 22006975 450 001 9910491023703321 005 20251225180509.0 010 $a3-030-80825-4 024 7 $a10.1007/978-3-030-80825-9 035 $a(CKB)4100000011982972 035 $a(MiAaPQ)EBC6676063 035 $a(Au-PeEL)EBL6676063 035 $a(PPN)257358900 035 $a(BIP)80861007 035 $a(BIP)80525557 035 $a(DE-He213)978-3-030-80825-9 035 $a(EXLCZ)994100000011982972 100 $a20210702d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment $e18th International Conference, DIMVA 2021, Virtual Event, July 14?16, 2021, Proceedings /$fedited by Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (403 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12756 311 08$a3-030-80824-6 327 $aYou?ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures -- The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild -- Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs -- Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy -- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device -- Refined Grey-Box Fuzzing with Sivo -- SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning -- SPECULARIZER: Uncovering Speculative Execution Attacks via Performance Tracing in Commodity Hardware -- Aion Attacks: Exposing Software Timer Problem in Trusted Execution Environment -- Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels -- Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races -- FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security -- Introspect Virtual Machines Like It Is the Linux Kernel! -- Calibration Done Right: Noiseless Flush+Flush Attacks -- Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates From Naturally Occurring Invariants -- PetaDroid: Adaptive Android Malware Detection using Deep Learning -- Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings -- Extended Abstract: A First Large-scale Analysis on Usage of MTA-STS -- Centy: Scalable Server-side Web Integrity Verification System Based on Fuzzy Hashes. 330 $aChapter ?SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing? is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12756 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aComputer crimes 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Engineering and Networks 606 $aComputing Milieux 606 $aComputer Crime 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 0$aComputer crimes. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 615 24$aComputer Crime. 676 $a005.8 702 $aBilge$b Leyla 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910491023703321 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$93395207 997 $aUNINA