Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
44
views
13
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,859
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Detection of Intrusions and Malware, and Vulnerability Assessment
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
other
Author(s):
Sam L. Thomas
,
Flavio D. Garcia
,
Tom Chothia
Publication date
(Online):
June 04 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Digital Science
Most cited references
13
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Experimental Security Analysis of a Modern Automobile
Hovav Shacham
,
Stefan Savage
,
Danny Anderson
…
(2010)
0
comments
Cited
130
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Learning and Classification of Malware Behavior
Konrad Rieck
,
Thorsten Holz
,
Carsten Willems
…
(2008)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Cross-Architecture Bug Search in Binary Executables
Jannik Pewny
,
Behrad Garmany
,
Robert Gawlik
…
(2015)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
June 04 2017
Pages
: 279-300
DOI:
10.1007/978-3-319-60876-1_13
SO-VID:
682fd63a-3372-4fdd-8d14-809da8955a7e
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Malware Guard Extension: Using SGX to Conceal Cache Attacks
pp. 25
On the Trade-Offs in Oblivious Execution Techniques
pp. 48
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
pp. 73
Measuring and Defeating Anti-Instrumentation-Equipped Malware
pp. 97
DynODet: Detecting Dynamic Obfuscation in Malware
pp. 119
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
pp. 141
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
pp. 161
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
pp. 209
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
pp. 230
SPEAKER: Split-Phase Execution of Application Containers
pp. 252
Deep Ground Truth Analysis of Current Android Malware
pp. 279
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
pp. 301
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
pp. 325
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
pp. 347
On the Privacy Impacts of Publicly Leaked Password Databases
pp. 366
Unsupervised Detection of APT C&C Channels using Web Request Graphs
pp. 388
Measuring Network Reputation in the Ad-Bidding Process
Similar content
4,859
Self-Humidifying Proton Exchange Membranes for Fuel Cell Applications: Advances and Challenges
Authors:
Seyed Hesam Mirfarsi
,
Mohammad Parnian
,
Soosan Rowshanzamir
Heated humidified high flow nasal cannula (HFNC) in the treatment of obstructive sleep apnea (OSA)
Authors:
J Perlstrom
,
NJ Macmillan
,
TL Miller
Changes in lung volumes and diffusing capacity in guinea pigs exposed to a combination of sulfur dioxide and submicron zinc oxide mixed in a humidified furnace
Authors:
H.F. Lam
,
R. Peisch
,
M.O. Amdur
See all similar
Cited by
4
Challenges in Firmware Re-Hosting, Emulation, and Analysis
Authors:
Christopher (Christopher Alec) Wright
,
William Moeglein
,
Saurabh Bagchi
…
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality
Authors:
Sam L. Thomas
,
Tom Chothia
,
Flavio D. Garcia
Backdoors: Definition, Deniability and Detection
Authors:
Sam Thomas
,
Aurelien Francillon
See all cited by