default search action
DIMVA 2009: Como, Italy
- Ulrich Flegel, Danilo Bruschi:
Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings. Lecture Notes in Computer Science 5587, Springer 2009, ISBN 978-3-642-02917-2
Malware and SPAM
- Youngsang Shin, Steven A. Myers, Minaxi Gupta:
A Case Study on Asprox Infection Dynamics. 1-20 - Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni:
How Good Are Malware Detectors at Remediating Infected Systems?. 21-37 - Jan Göbel, Thorsten Holz, Philipp Trinius:
Towards Proactive Spam Filtering (Extended Abstract). 38-47
Emulation-Based Detection
- Chaoting Xuan, John A. Copeland, Raheem A. Beyah:
Shepherding Loadable Kernel Modules through On-demand Emulation. 48-67 - Makoto Shimamura, Kenji Kono:
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. 68-87 - Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda:
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. 88-106
Software Diversity
- Zhiqiang Lin, Ryan D. Riley, Dongyan Xu:
Polymorphing Software by Randomizing Data Structure Layout. 107-126 - Jin Han, Debin Gao, Robert H. Deng:
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. 127-146
Harnessing Context
- François Gagnon, Frédéric Massicotte, Babak Esfandiari:
Using Contextual Information for IDS Alarm Classification (Extended Abstract). 147-156 - Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter:
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. 157-175 - Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka:
A Service Dependency Modeling Framework for Policy-Based Response Enforcement. 176-195
Anomaly Detection
- Christian Bockermann, Martin Apel, Michael Meier:
Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). 196-205 - Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero:
Selecting and Improving System Call Models for Anomaly Detection. 206-223
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.