Dimva 2014 July 10, 2014 to July 11, 2014, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Healing Heartbleed: Vulnerability Mitigation with Internet-wide Scanning Alex Halderman Internet-wide network scanning has powerful security applications, including exposing vulnerabilities and tracking their mitigation. Unfortunately, ...
Data structure archaeology: scrape away the dirt and glue back the pieces! (Or: automated techniques to recover split and merged variables) Herbert Bos , Istvan Haller , Asia Slowinska , Andrei Bacs , Silviu Horia Baranga Many software vendors use data obfuscation to make it hard for reverse engineers to recover ...
Identifying Shared Software Components to Support Malware Forensics Michael Howard , Arun Lakhotia , Brian Ruttenberg , Craig Miles , Lee Kellog , Vivek Notani , Charles Ledoux , Avi Pfeffer Recent reports from the anti-malware industry indicate similarity between malware code resulting from code reuse ...
Instruction-Level Steganography for Covert Trigger-Based Malware (short paper) Herbert Bos , Dennis Andriesse Trigger-based malware is designed to remain dormant and undetected unless a specific trigger occurs. Such ...
Keynote Talk: The economics and psychology of botnets Ross Anderson We know that botnets are a problem, but why should anyone pay attention? How big ...
AndRadar: Fast Discovery of Android Applications in Alternative Markets Stefano Zanero , Sotiris Ioannidis , Federico Maggi , Elias Athanasopoulos , Matthias Neugschwandtner , Stamatis Volanis , Martina Lindorfer , Christian Platzer , Alessandro Sisto Compared to traditional desktop software, Android applications are delivered through software repositories, commonly known as ...
Attacks on Android Clipboard Wenliang Du , Xiao Zhang In this paper, we perform a thorough study on the risks imposed by the globally ...
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics Herbert Bos , Cristiano Giuffrida , Mauro Conti , Kamil Majdanik Mobile devices have become an important part of our everyday life, harvesting more and more ...
AV-Meter: An Evaluation of Antivirus Scans and Labels Aziz Mohaisen , Omar Alrawi Antivirus scanners are designed to detect malware and, to a lesser extent, to label detections ...
PExy: The other side of Exploit Kits Christopher Kruegel , Giovanni Vigna , Alexandros Kapravelos , Yan Shoshitaishvili , Giancarlo De Maio The drive-by download scene has changed dramatically in the last few years. What was a ...
Metadata-driven Threat Classification of Network Endpoints Appearing in Malware Aziz Mohaisen , Andrew West Networked machines serving as binary distribution points, C&C channels, or drop sites are a ubiquitous ...
Lawful Hacking: Using Internet Vulnerabilities to Wiretap Internet Communications Susan Landau For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder ...
Parallelization of Network Intrusion Detection Systems under Attack Conditions Hartmut Koenig , Michael Vogel , Rene Rietz , Franka Schuster Intrusion detection systems are proven remedies to protect networks and end systems in practice. IT ...
Phoenix: DGA-based Botnet Tracking and Intelligence Stefano Zanero , Federico Maggi , Lorenzo Cavallaro , Stefano Schiavoni Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures. Given the prevalence ...
Quantifiable Run-time Kernel Attack Surface Reduction Anil Kurmus , Sergej Dechand , Ruediger Kapitza The sheer size of commodity operating system kernels makes them a prime target for local ...
Bee Master: Detecting Host-Based Code Injection Attacks Sebastian Eschweiler , Elmar Gerhards-padilla , Thomas Barabosch A technique commonly used by malware for hiding on a targeted system is the host-based ...