Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (28. : 2021 : Online) Network and Distributed System Security Symposium 2021 (NDSS'21) ; Volume 2 of 2
1. Verfasser: Küchler, Alexander (VerfasserIn)
Weitere Verfasser: Mantovani, Alessandro (VerfasserIn), Han, Yufei (VerfasserIn), Bilge, Leyla (VerfasserIn), Balzarotti, Davide (VerfasserIn)
Pages:2021
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces 2021 Ye, Yapeng
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets 2021 Oi, Zhenxiao
Understanding and Detecting International Revenue Share Fraud 2021 Sahin, Merve
MINOS: A Lightweight Real-Time Cryptojacking Detection System 2021 Naseem, Faraz
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection 2021 Chi, Haotian
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data 2021 Liang, Junjie
HERA: Hotpatching of Embedded Real-time Applications 2021 Niesler, Christian
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping 2021 Cao, Xiaoyu
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning 2021 Shejwalkar, Virat
DOVE: A Data-Oblivious Virtual Environment 2021 Lee, Hyun Bin
Emilia: Catching Iago in Legacy Code 2021 Cui, Rongzhen
CV-Inspector: Towards Automating Detection of Adblock Circumvention 2021 Le, Hieu
PhantomCache: Obfuscating Cache Conflicts with Localized Rendomization 2021 Tan, Oinhan
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel 2021 Liu, Zhuoran
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers 2021 Shelton, Madura A.
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation 2021 Ma, Jack P. K.
GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks 2021 Zhang, Qiao
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware 2021 Li, Wenqiang
Evading Voltage-Based Intrusion Detection on Automotive CAN 2021 Bhatia, Rohit
Data Poisoning Attacks to Deep Learning Based Recommender Systems 2021 Huang, Hai
Alle Artikel auflisten