Dimva 2013 July 17, 2013 to July 19, 2013, Berlin,Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Malevolution: The Evolution of Evasive Malware Giovanni Vigna In recent years, malware has evolved by introducing novel techniques to foil analysis and identification. ...
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting A. Nappa , M. zubair Rafique , J. Caballero Drive-by downloads are the preferred distribution vector for many malware families. In the drive-by ecosystem ...
ProVeX: Detecting Botnets with Encrypted Command and Control Channels C. Rossow , C. Dietrich Botmasters increasingly encrypt command-and-control (C&C) communication to evade existing intrusion detection systems. Our detailed C&C ...
Exploring Discriminatory Features for Automated Malware Classification G. Yan , N. Brown , D. Kong The ever-growing malware threat in the cyber space calls for techniques that are more effective ...
Invited talk: Defense Research against Nation-State Actors Felix 'fx' Lindner The increased interest of nation-state actors in offensive strategies for espionage and military expands the ...
PeerRush: Mining for Unwanted P2P Traffic B. Rahbarinia , R. Perdisci , A. Lanzi , K. Li In this paper we present PeerRush, a novel system for the identification of unwanted P2P ...
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks Y. Cohen , D. Gordon , D. Hendler We present ErDOS, an Early Detection scheme for Outgoing Spam. The detection approach implemented by ...
Fighting Targeted Attacks on Government Networks Robert Krawczyk The network infrastructure of any government is under constant attack from cyber criminals and intelligence ...
PreparedJS: Secure Script-Templates for JavaScript M. Johns Content Security Policies (CSP) provide powerful means to mitigate most XSS exploits. However, CSP's protection ...
Securing Legacy Firefox Extensions with Sentinel K. Onarlioglu , M. Battal , W. Robertson , E. Kirda A poorly designed web browser extension with a security vulnerability may expose the whole system ...
Weaknesses in Defenses Against Web-Borne Malware (Short Paper) G. Lu , S. Debray Web-based mechanisms, often mediated by malicious JavaScript code, play an important role in malware delivery ...
SMS-based One-Time Passwords: Attacks and Defense (Short Paper) C. Mulliner , R. Borgaonkar , P. Stewin , J.-p. Seifert SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing and other attacks against Internet ...
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO A. Paul , F. Schuster , H. Koenig The trend of introducing common information and communication technologies into automation control systems induces besides ...
HeapSentry: Kernel-assisted Protection against Heap Overflows N. Nikiforakis , F. Piessens , W. Joosen The last twenty years have witnessed the constant reaction of the security community to memory ...