Detection of Intrusions and Malware, and Vulnerability Assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings / [electronic resource] : edited by Christian Kreibich, Marko Jahnke. - 1st ed. 2010. - XII, 219 p. 55 illus. online resource. - Security and Cryptology, 6201 2946-1863 ; . - Security and Cryptology, 6201 .

Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS - Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.

9783642142154

10.1007/978-3-642-14215-4 doi


Computer networks .
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computers and civilization.
Application software.
Algorithms.
Computer Communication Networks.
Cryptology.
IT Operations.
Computers and Society.
Computer and Information Systems Applications.
Algorithms.

TK5105.5-5105.9

004.6