Detection of Intrusions and Malware, and Vulnerability Assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2010, 2010
|
Edition: | 1st ed. 2010 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Host Security
- HookScout: Proactive Binary-Centric Hook Detection
- Conqueror: Tamper-Proof Code Execution on Legacy Systems
- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection
- Trends
- Evaluating Bluetooth as a Medium for Botnet Command and Control
- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
- Covertly Probing Underground Economy Marketplaces
- Vulnerabilities
- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners
- Organizing Large Scale Hacking Competitions
- Intrusion Detection
- An Online Adaptive Approach to Alert Correlation
- KIDS – Keyed Intrusion Detection System
- Web Security
- Modeling and Containment of Search Worms Targeting Web Applications
- HProxy: Client-Side Detection of SSL Stripping Attacks