The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.
The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.
Hybrid Pruning: Towards A Precise Static Analysis.- Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models.- Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.- COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.- Prioritizing Antivirus Alerts on Internal Enterprise Machines.- VANDALIR: Vulnerability Analyses based on Datalog and LLVM-IR.- Branch Different - Spectre Attacks on Apple Silicon.- MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys .- A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities.- Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.- Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.