|
11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment July 10-11, 2014 Egham, London, UK |
(in no particular order)
Phoenix: DGA-based Botnet Tracking and Intelligence
Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro and Stefano Zanero
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits
Tielei Wang, Chengyu Song and Wenke Lee
AV-Meter: An Evaluation of Antivirus Scans and Labels
Aziz Mohaisen and Omar Alrawi
Attacks on Android Clipboard
Xiao Zhang and Wenliang Du
Metadata-driven Threat Classification of Network Endpoints Appearing in Malware
Andrew West and Aziz Mohaisen
Instruction-Level Steganography for Covert Trigger-Based Malware
Dennis Andriesse and Herbert Bos
Parallelization of Network Intrusion Detection Systems under Attack Conditions
Ren Rietz, Franka Schuster, Hartmut Koenig and Michael Vogel
AndRadar: Fast Discovery of Android Applications in Alternative Markets
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero and Sotiris Ioannidis
Bee Master: Detecting Host-Based Code Injection Attacks
Thomas Barabosch, Sebastian Eschweiler and Elmar Gerhards-Padilla
Data structure archaeology: scrape away the dirt and glue back
the pieces!
(Or: automated techniques to recover split and merged variables)
Asia Slowinska, Istvan Haller, Andrei Bacs, Silviu Horia Baranga and Herbert Bos
Quantifiable Run-time Kernel Attack Surface Reduction
Anil Kurmus, Sergej Dechand and Ruediger Kapitza
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics
Cristiano Giuffrida, Kamil Majdanik, Mauro Conti and Herbert Bos
PExy: The other side of Exploit Kits
Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel and Giovanni Vigna
Identifying Shared Software Components to Support Malware Forensics
Brian Ruttenberg, Craig Miles, Lee Kellog, Vivek Notani, Michael Howard, Charles Ledoux, Arun Lakhotia and Avi Pfeffer