Refined Grey-Box Fuzzing with SIVO

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:DIMVA (18. : 2021 : Online) Detection of Intrusions and Malware, and Vulnerability Assessment
1. Verfasser: Nikolić, Ivica (VerfasserIn)
Weitere Verfasser: Mantu, Radu (VerfasserIn), Shen, Shigi (VerfasserIn), Saxena, Prateek (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs 2021 Subramani, Karthika
Refined Grey-Box Fuzzing with SIVO 2021 Nikolić, Ivica
Introspect Virtual Machines Like It Is the Linux Kernel 2021 Abdelraoof, Ahmed
FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security 2021 Durey, Antonin
Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates from Naturally Occurring Invariants 2021 Tung, Yu-Jye
Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes 2021 Tengana, Lizzy
Aion Attacks: Manipulating Software Timers in Trusted Execution Environment 2021 Huang, Wei
PetaDroid: Adaptive Android Malware Detection Using Deep Learning 2021 Karbab, ElMouatez Billah
You’ve Got (a Reset) Mail: A Security Analysıs of Email-Based Password Reset Procedures 2021 Innocenti, Tommaso
SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracimg 2021 Wang, Wubing
Calibration Right: Noiseless Flush+Flush Attacks 2021 Didier, Done Guillaume
Extended Abstract: A First Large-Scale Analysis on Usage of MTA-STS 2021 Tatang, Dennis
Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Training 2021 Quinkert, Florian
The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild 2021 Benolli, Michele
Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy 2021 Quinkert, Florian
Help, My Signal has Bad Device! Breaking the Signal Messenger’s Post-Compromise Security Through a Malicious Device 2021 Wichelmann, Jan
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Leaming 2021 Mirzaei, Omid
THIRD- EYE: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels 2021 Yuan, Chuhong
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races 2021 Setayeshfar, Omid
Alle Artikel auflisten