↓ Skip to main content

Detection of Intrusions and Malware, and Vulnerability Assessment

Overview of attention for book
Cover of 'Detection of Intrusions and Malware, and Vulnerability Assessment'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions
  3. Altmetric Badge
    Chapter 2 New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild
  4. Altmetric Badge
    Chapter 3 Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting
  5. Altmetric Badge
    Chapter 4 On the Perils of Leaking Referrers in Online Collaboration Services
  6. Altmetric Badge
    Chapter 5 Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems
  7. Altmetric Badge
    Chapter 6 Overshadow PLC to Detect Remote Control-Logic Injection Attacks
  8. Altmetric Badge
    Chapter 7 A Security Evaluation of Industrial Radio Remote Controllers
  9. Altmetric Badge
    Chapter 8 Understanding the Security of Traffic Signal Infrastructure
  10. Altmetric Badge
    Chapter 9 Practical Enclave Malware with Intel SGX
  11. Altmetric Badge
    Chapter 10 How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement
  12. Altmetric Badge
    Chapter 11 On Deception-Based Protection Against Cryptographic Ransomware
  13. Altmetric Badge
    Chapter 12 PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware
  14. Altmetric Badge
    Chapter 13 Memory Categorization: Separating Attacker-Controlled Data
  15. Altmetric Badge
    Chapter 14 TypeMiner: Recovering Types in Binary Programs Using Machine Learning
  16. Altmetric Badge
    Chapter 15 SAFE: Self-Attentive Function Embeddings for Binary Similarity
  17. Altmetric Badge
    Chapter 16 Triggerflow: Regression Testing by Advanced Execution Path Inspection
  18. Altmetric Badge
    Chapter 17 Large-Scale Analysis of Infrastructure-Leaking DNS Servers
  19. Altmetric Badge
    Chapter 18 Security in Plain TXT
  20. Altmetric Badge
    Chapter 19 No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP
  21. Altmetric Badge
    Chapter 20 DPX: Data-Plane eXtensions for SDN Security Service Instantiation
  22. Altmetric Badge
    Chapter 21 Practical Password Hardening Based on TLS
  23. Altmetric Badge
    Chapter 22 Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks
  24. Altmetric Badge
    Chapter 23 B in T rimmer : Towards Static Binary Debloating Through Abstract Interpretation
Attention for Chapter 15: SAFE: Self-Attentive Function Embeddings for Binary Similarity
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
103 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
SAFE: Self-Attentive Function Embeddings for Binary Similarity
Chapter number 15
Book title
Detection of Intrusions and Malware, and Vulnerability Assessment
Published by
Springer, Cham, June 2019
DOI 10.1007/978-3-030-22038-9_15
Book ISBNs
978-3-03-022037-2, 978-3-03-022038-9
Authors

Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 103 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 103 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 26 25%
Student > Master 12 12%
Researcher 12 12%
Student > Bachelor 5 5%
Student > Postgraduate 3 3%
Other 2 2%
Unknown 43 42%
Readers by discipline Count As %
Computer Science 48 47%
Engineering 4 4%
Mathematics 1 <1%
Chemistry 1 <1%
Biochemistry, Genetics and Molecular Biology 1 <1%
Other 0 0%
Unknown 48 47%