Detection of Intrusions and Malware, and Vulnerability Assessment
6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings
(Sprache: Englisch)
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 6th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Since 2004, DIMVA annually brings together leading...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
54.99 €
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenlose Rücksendung
- Ratenzahlung möglich
Produktdetails
Produktinformationen zu „Detection of Intrusions and Malware, and Vulnerability Assessment “
Klappentext zu „Detection of Intrusions and Malware, and Vulnerability Assessment “
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 6th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Since 2004, DIMVA annually brings together leading researchers and practitioners from academia, government and industry to present and discuss novel security research. DIMVA is organized by the Special Interest Group Security-Intrusion Detection and Response (SIDAR)-of the German Inf- matics Society (GI). The DIMVA 2009 Program Committee received 44 submissions from ind- trial and academic organizations from 17 di?erent countries. Each submission was carefully reviewed by at least three Program Committee members or ext- nal experts. The submissions were evaluated on the basis of scienti?c novelty, importance to the ?eld and technical quality. The ?nal selection took place at the Program Committee meeting held on March 23, 2009, in Brussels, Belgium. Ten full papers and three extended abstracts were selected for presentation and publication in the conference proceedings. TheconferencetookplaceduringJuly9-10,2009,atVillaGallia,LakeComo, Italy, with the program grouped into ?ve sessions. Two keynote speeches were presented by Richard A. Kemmerer (University of California, Santa Barbara) and HenryStern (Ironport/ Cisco).The conferenceprogramwascomplemented by the Capture-the-Flag contest CIPHER (Challenges in Informatics: Progr- ming, Hosting and ExploRing) organized by Lexi Pimenidis (iDev GmbH) and a rump session organized by Sven Dietrich (Stevens Institute of Technology). A successful conference is the result of the joint e?ort of many people. In particular, we would like to thank all the authors who submitted contributions.
Inhaltsverzeichnis zu „Detection of Intrusions and Malware, and Vulnerability Assessment “
- Malware and SPAM- A Case Study on Asprox Infection Dynamics
- How Good Are Malware Detectors at Remediating Infected Systems?
- Towards Proactive Spam Filtering (Extended Abstract)
- Emulation-Based Detection
- Shepherding Loadable Kernel Modules through On-demand Emulation
- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
- Software Diversity
- Polymorphing Software by Randomizing Data Structure Layout
- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
- Harnessing Context
- Using Contextual Information for IDS Alarm Classification (Extended Abstract)
- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
- A Service Dependency Modeling Framework for Policy-Based Response Enforcement
- Anomaly Detection
- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract)
- Selecting and Improving System Call Models for Anomaly Detection
Bibliographische Angaben
- 2009, 2009, X, 225 Seiten, mit Abbildungen, Maße: 15,5 x 23,5 cm, Kartoniert (TB), Englisch
- Herausgegeben: Ulrich Flegel, Danilo Bruschi
- Verlag: Springer, Berlin
- ISBN-10: 3642029175
- ISBN-13: 9783642029172
- Erscheinungsdatum: 01.07.2009
Sprache:
Englisch
Kommentar zu "Detection of Intrusions and Malware, and Vulnerability Assessment"
Schreiben Sie einen Kommentar zu "Detection of Intrusions and Malware, and Vulnerability Assessment".
Kommentar verfassen