Malware Detection 2007
Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (Eds.): Malware Detection. Springer 2007 Advances in Information Security 27 ISBN 978-0-387-32720-4
Part I / Overview
Brian Witten, Carey Nachenberg: Malware Evolution: A Snapshot of Threats and Countermeasures in 2005. 3-15
Part II / Software Analysis and Assurance
Giovanni Vigna: Static Disassembly and Code Analysis. 19-41
Thomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum: A Next-Generation Platform for Analyzing Executables. 43-61
Christopher Kruegel: Behavioral and Structural Properties of Malicious Code. 63-83
Part III / Distributed Threat Detection and Defense
Nicholas Weaver, Stuart Staniford, Vern Paxson: Very Fast Containment of Scanning Worms, Revisited. 113-145
David Brumley, James Newsome, Dawn Song: Sting: An End-to-End Self-Healing System for Defending against Internet Worms. 147-170
Mihai Christodorescu, Shai Rubin: Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy? 193-209
Part IV / Stealthy and Targeted Threat Detection and Defense
Stelios Sidiroglou, Angelos D. Keromytis: Composite Hybrid Techniques For Defending Against Targeted Attacks. 213-229
Part V / Novel Techniques for Constructing Trustworthy Services
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, Pradeep K. Khosla: Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. 253-289
Geoffrey Smith: Principles of Secure Information Flow Analysis. 291-307



