Detection of Intrusions and Malware, and Vulnerability Assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings / [electronic resource] :
edited by Christian Kreibich, Marko Jahnke.
- 1st ed. 2010.
- XII, 219 p. 55 illus. online resource.
- Security and Cryptology, 6201 2946-1863 ; .
- Security and Cryptology, 6201 .
Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS - Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
9783642142154
10.1007/978-3-642-14215-4 doi
Computer networks .
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computers and civilization.
Application software.
Algorithms.
Computer Communication Networks.
Cryptology.
IT Operations.
Computers and Society.
Computer and Information Systems Applications.
Algorithms.
TK5105.5-5105.9
004.6
Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS - Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
9783642142154
10.1007/978-3-642-14215-4 doi
Computer networks .
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computers and civilization.
Application software.
Algorithms.
Computer Communication Networks.
Cryptology.
IT Operations.
Computers and Society.
Computer and Information Systems Applications.
Algorithms.
TK5105.5-5105.9
004.6