主页
外文期刊
OA 期刊
电子期刊
外文会议
中文期刊
标准
网络数据库
专业机构
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Detection of Intrusions and Malware, and Vulnerability Assessment
会议名
22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2025)
中译名
《第二十二届国际入侵与恶意软件监测及漏洞评估会议,卷2》
会议日期
July 9-11, 2025
会议地点
Graz, Austria
出版年
2025
馆藏号
358612
题名
作者
出版年
Towards Explainable Drift Detection and Early Retrain in ML-Based Malware Detection Pipelines
Jayesh Tripathi; Heitor Gomes; Marcus Botacin
2025
InferONNX: Practical and Privacy-Preserving Machine Learning Inference Using Trusted Execution Environments
Konstantina Papafragkaki; Giorgos Vasiliadis
2025
Hiding in Plain Sight: On the Robustness of AI-Generated Code Detection
Saman Pordanesh; Sufiyan Bukhari; Benjamin Tan; Lorenzo De Carli
2025
FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks
Xiaolong Wu; Aravind Kumar Machiry; Yung-Hsiang Lu; Dave Jing Tian
2025
Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains
Tomas Pelayo-Benedet; Ricardo J. Rodriguez; Carlos H. Ganan
2025
Poster: Using Machine Learning to Infer Network Structure from Security Metadata
Asfa Khalid; Sean Og Murphy; Cormac J. Sreenan; Utz Roedig
2025
More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing
Norah Ridley; Enrico Branca; Natalia Stakhanova
2025
An Empirical Study of Multi-language Security Patches in Open Source Software
Shiyu Sun; Yunlong Xing; Grant Zou; Xinda Wang; Kun Sun
2025
Red Light for Security: Uncovering Auto Feature Check and Access Control Gaps in AAOS
Jumana; Parjanya Vyas; Yousra Aafer
2025
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities
Roberto Rossini; Simeone Pizzi; Samuele Doria; Mauro Conti; Eleonora Losiouk
2025
Taming the Linux Memory Allocator for Rapid Prototyping
Ruiyi Zhang; Tristan Hornetz; Lukas Gerlach; Michael Schwarz
2025
Linux Hurt Itself in Its Confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation
Lorenzo Bossi; Daniele Mammone; Michele Carminati; Stefano Zanero; Stefano Longari
2025
Overlapping Data in Network Protocols: Bridging OS and NIDS Reassembly Gap
Lucas Aubard; Johan Mazel; Gilles Guette; Pierre Chifflier
2025
Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs
Marco Calavaro; Pasquale Caporaso; Luca Capotombolo; Giuseppe Bianchi; Francesco Quaglia
2025
Poster: Referencing Your Privileges - A Data-Only Exploit Technique for the Windows Kernel
Nicola Stauffer; Gurkan Gur
2025
PackHero: A Scalable Graph-Based Approach for Efficient Packer Identification
Marco Di Gennaro; Mario D' Onghia; Mario Polino; Stefano Zanero; Michele Carminati
2025
A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts
Nicola Ruaro; Fabio Gritti; Robert McLaughlin; Dongyu Meng; Ilya Grishchenko; Christopher Kruegel; Giovanni Vigna
2025
FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors
Moritz Waser; David Schrammel; Robert Schilling; Stefan Mangard
2025
Poster: Building Confidence in Hardware-Based Ransomware Detection Through Hardware Performance Counter Event Correlation
Ryan Binder; Joshua Byun; Dane Brown; T. Owens Walker; Jennie E. Hill
2025
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning
Gabriele Digregorio; Francesco Bleggi; Federico Caroli; Michele Carminati; Stefano Zanero; Stefano Longari
2025
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2025