↓ Skip to main content

Detection of Intrusions and Malware, and Vulnerability Assessment

Overview of attention for book
Cover of 'Detection of Intrusions and Malware, and Vulnerability Assessment'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Malware Guard Extension: Using SGX to Conceal Cache Attacks
  3. Altmetric Badge
    Chapter 2 On the Trade-Offs in Oblivious Execution Techniques
  4. Altmetric Badge
    Chapter 3 MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
  5. Altmetric Badge
    Chapter 4 Measuring and Defeating Anti-Instrumentation-Equipped Malware
  6. Altmetric Badge
    Chapter 5 DynODet: Detecting Dynamic Obfuscation in Malware
  7. Altmetric Badge
    Chapter 6 Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
  8. Altmetric Badge
    Chapter 7 Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
  9. Altmetric Badge
    Chapter 8 LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
  10. Altmetric Badge
    Chapter 9 A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks
  11. Altmetric Badge
    Chapter 10 Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
  12. Altmetric Badge
    Chapter 11 SPEAKER: Split-Phase Execution of Application Containers
  13. Altmetric Badge
    Chapter 12 Deep Ground Truth Analysis of Current Android Malware
  14. Altmetric Badge
    Chapter 13 HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
  15. Altmetric Badge
    Chapter 14 BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
  16. Altmetric Badge
    Chapter 15 SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
  17. Altmetric Badge
    Chapter 16 On the Privacy Impacts of Publicly Leaked Password Databases
  18. Altmetric Badge
    Chapter 17 Unsupervised Detection of APT C&C Channels using Web Request Graphs
  19. Altmetric Badge
    Chapter 18 Measuring Network Reputation in the Ad-Bidding Process
Attention for Chapter 2: On the Trade-Offs in Oblivious Execution Techniques
Altmetric Badge

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
On the Trade-Offs in Oblivious Execution Techniques
Chapter number 2
Book title
Detection of Intrusions and Malware, and Vulnerability Assessment
Published by
Springer, Cham, July 2017
DOI 10.1007/978-3-319-60876-1_2
Book ISBNs
978-3-31-960875-4, 978-3-31-960876-1
Authors

Shruti Tople, Prateek Saxena, Tople, Shruti, Saxena, Prateek

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 9 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 9 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 44%
Professor 1 11%
Student > Doctoral Student 1 11%
Unknown 3 33%
Readers by discipline Count As %
Computer Science 6 67%
Engineering 1 11%
Unknown 2 22%