top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 496 p. 115 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Operating systems (Computers)
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Operating Systems
ISBN 3-319-66332-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers            -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD.
Record Nr. UNISA-996465562803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Research in Attacks, Intrusions, and Defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Research in Attacks, Intrusions, and Defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 496 p. 115 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Operating systems (Computers)
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Operating Systems
ISBN 3-319-66332-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers            -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD.
Record Nr. UNINA-9910484794103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings / / edited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings / / edited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 482 p. 126 illus.)
Disciplina 005.7
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Computer communication systems
Application software
Software engineering
Algorithms
Systems and Data Security
Management of Computing and Information Systems
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Algorithm Analysis and Problem Complexity
ISBN 3-319-45719-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Systems security -- Low-level attacks and defenses -- Measurement studies.-Malware analysis -- Network security -- Systematization of knowledge and experience reports -- Web and mobile security.
Record Nr. UNISA-996466271403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Research in Attacks, Intrusions, and Defenses : 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings / / edited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro
Research in Attacks, Intrusions, and Defenses : 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings / / edited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 482 p. 126 illus.)
Disciplina 005.7
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Computer communication systems
Application software
Software engineering
Algorithms
Systems and Data Security
Management of Computing and Information Systems
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Algorithm Analysis and Problem Complexity
ISBN 3-319-45719-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Systems security -- Low-level attacks and defenses -- Measurement studies.-Malware analysis -- Network security -- Systematization of knowledge and experience reports -- Web and mobile security.
Record Nr. UNINA-9910483052503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui