会议文集


文集名Detection of Intrusions and Malware, and Vulnerability Assessment
会议名22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2025)
中译名《第二十二届国际入侵与恶意软件监测及漏洞评估会议,卷2》
会议日期July 9-11, 2025
会议地点Graz, Austria
出版年2025
馆藏号358612


题名作者出版年
Towards Explainable Drift Detection and Early Retrain in ML-Based Malware Detection PipelinesJayesh Tripathi; Heitor Gomes; Marcus Botacin2025
InferONNX: Practical and Privacy-Preserving Machine Learning Inference Using Trusted Execution EnvironmentsKonstantina Papafragkaki; Giorgos Vasiliadis2025
Hiding in Plain Sight: On the Robustness of AI-Generated Code DetectionSaman Pordanesh; Sufiyan Bukhari; Benjamin Tan; Lorenzo De Carli2025
FlexGE: Towards Secure and Flexible Model Partition for Deep Neural NetworksXiaolong Wu; Aravind Kumar Machiry; Yung-Hsiang Lu; Dave Jing Tian2025
Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated DomainsTomas Pelayo-Benedet; Ricardo J. Rodriguez; Carlos H. Ganan2025
Poster: Using Machine Learning to Infer Network Structure from Security MetadataAsfa Khalid; Sean Og Murphy; Cormac J. Sreenan; Utz Roedig2025
More Than You Signed Up For: Exposing Gaps in the Validation of Android's App SigningNorah Ridley; Enrico Branca; Natalia Stakhanova2025
An Empirical Study of Multi-language Security Patches in Open Source SoftwareShiyu Sun; Yunlong Xing; Grant Zou; Xinda Wang; Kun Sun2025
Red Light for Security: Uncovering Auto Feature Check and Access Control Gaps in AAOSJumana; Parjanya Vyas; Yousra Aafer2025
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps VulnerabilitiesRoberto Rossini; Simeone Pizzi; Samuele Doria; Mauro Conti; Eleonora Losiouk2025
Taming the Linux Memory Allocator for Rapid PrototypingRuiyi Zhang; Tristan Hornetz; Lukas Gerlach; Michael Schwarz2025
Linux Hurt Itself in Its Confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic ManipulationLorenzo Bossi; Daniele Mammone; Michele Carminati; Stefano Zanero; Stefano Longari2025
Overlapping Data in Network Protocols: Bridging OS and NIDS Reassembly GapLucas Aubard; Johan Mazel; Gilles Guette; Pierre Chifflier2025
Poster: On the Usage of Kernel Shadow Stacks for User-Level ProgramsMarco Calavaro; Pasquale Caporaso; Luca Capotombolo; Giuseppe Bianchi; Francesco Quaglia2025
Poster: Referencing Your Privileges - A Data-Only Exploit Technique for the Windows KernelNicola Stauffer; Gurkan Gur2025
PackHero: A Scalable Graph-Based Approach for Efficient Packer IdentificationMarco Di Gennaro; Mario D' Onghia; Mario Polino; Stefano Zanero; Michele Carminati2025
A History of Greed: Practical Symbolic Execution for Ethereum Smart ContractsNicola Ruaro; Fabio Gritti; Robert McLaughlin; Dongyu Meng; Ilya Grishchenko; Christopher Kruegel; Giovanni Vigna2025
FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V ProcessorsMoritz Waser; David Schrammel; Robert Schilling; Stefan Mangard2025
Poster: Building Confidence in Hardware-Based Ransomware Detection Through Hardware Performance Counter Event CorrelationRyan Binder; Joshua Byun; Dane Brown; T. Owens Walker; Jennie E. Hill2025
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated LearningGabriele Digregorio; Francesco Bleggi; Federico Caroli; Michele Carminati; Stefano Zanero; Stefano Longari2025