The 18th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
14-16 July 2021 - Online Streaming
Program
14:00-14:15 (CEST)
Opening Remarks / General Chair and Program Chairs
14:20-15:35
Session #1: Study to Uncover
Chair: Ulrich Flegel
14:20 | FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security
14:45 | Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy
15:10 | A First Large-scale Analysis on Usage of MTA-STS
15:35-15:45
(virtual) Coffee break
15:45-17:00
Session #2: Malware, malware, malware
Chair: Christian Rossow
15:45 | PetaDroid: Adaptive Android Malware Detection using Deep Learning
16:10 | SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning
16:35 | Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates From Naturally Occurring Invariants
Video (recording) of the 1st day of the conference
Access Password: 4z3^fB&e
14:00-15:15
Session #3: Analyze the code like you own it
Chair: Sven Dietrich
14:00 | Refined Grey-Box Fuzzing with Sivo
14:25 | Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels
14:50 | Introspect Virtual Machines Like It Is the Linux Kernel!
15:15-15:30
(virtual) Coffee break
15:30-16:45
Session #4: Security Analysis
Chair: Federico Maggi
15:30 | Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device
15:55 | Centy: Scalable Server-side Web Integrity Verification System Based on Fuzzy Hashes
16:20 | You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures
16:45-17:00
(virtual) Coffee break
17:00-18:00
Keynote: Designing technology in pandemic times
Chair: Leyla Bilge
Video (recording) of the 2nd day of the conference
Access Password: 5+cH=kJ!
14:00-16:05
Session #5: Attacks are the “best”
Chair: Anita NIkolich
14:00 | Calibration Done Right: Noiseless Flush+Flush Attacks
14:25 | The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild
14:50 | SPECULARIZER: Uncovering Speculative Execution Attacks via Performance Tracing in Commodity Hardware
15:15 | Aion Attacks: Exposing Software Timer Problem in Trusted Execution Environment
15:40 | Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs
16:05-16:10
(virtual) Coffee break
16:10-17:00
Session #6: “Just an IT Issue”?
Chair: Platon Kotzias
16:10 | Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings
16:35 | Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races
17:00-17:15
Closing Remarks
Video (recording) of the 3rd day of the conference
Access Password: e2t+4va^