List of Accepted Papers

(in no particular order)

  1. Phoenix: DGA-based Botnet Tracking and Intelligence

    Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro and Stefano Zanero

  2. Diagnosis and Emergency Patch Generation for Integer Overflow Exploits

    Tielei Wang, Chengyu Song and Wenke Lee

  3. AV-Meter: An Evaluation of Antivirus Scans and Labels

    Aziz Mohaisen and Omar Alrawi

  4. Attacks on Android Clipboard

    Xiao Zhang and Wenliang Du

  5. Metadata-driven Threat Classification of Network Endpoints Appearing in Malware

    Andrew West and Aziz Mohaisen

  6. Instruction-Level Steganography for Covert Trigger-Based Malware

    Dennis Andriesse and Herbert Bos

  7. Parallelization of Network Intrusion Detection Systems under Attack Conditions

    Ren Rietz, Franka Schuster, Hartmut Koenig and Michael Vogel

  8. AndRadar: Fast Discovery of Android Applications in Alternative Markets

    Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero and Sotiris Ioannidis

  9. Bee Master: Detecting Host-Based Code Injection Attacks

    Thomas Barabosch, Sebastian Eschweiler and Elmar Gerhards-Padilla

  10. Data structure archaeology: scrape away the dirt and glue back the pieces!
    (Or: automated techniques to recover split and merged variables)

    Asia Slowinska, Istvan Haller, Andrei Bacs, Silviu Horia Baranga and Herbert Bos

  11. Quantifiable Run-time Kernel Attack Surface Reduction

    Anil Kurmus, Sergej Dechand and Ruediger Kapitza

  12. I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics

    Cristiano Giuffrida, Kamil Majdanik, Mauro Conti and Herbert Bos

  13. PExy: The other side of Exploit Kits

    Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel and Giovanni Vigna

  14. Identifying Shared Software Components to Support Malware Forensics

    Brian Ruttenberg, Craig Miles, Lee Kellog, Vivek Notani, Michael Howard, Charles Ledoux, Arun Lakhotia and Avi Pfeffer

[ ↑ ]

Conference of SIG SIDAR of the German Informatics Society (GI).
Technically co-sponsored by the IEEE Computer Society Technical Committee on Security & Privacy (TCSP).
Local organization by - Information Security Group, Royal Holloway University of London.
All pages © 2014, DIMVA 2014 Organization Committee.