Normal view MARC view ISBD view

Detection of Intrusions and Malware, and Vulnerability Assessment [electronic resource] : 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings / edited by Christian Kreibich, Marko Jahnke.

Contributor(s): Kreibich, Christian [editor.] | Jahnke, Marko [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 6201Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010Edition: 1st ed. 2010.Description: XII, 219 p. 55 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642142154.Subject(s): Computer networks  | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Computers and civilization | Application software | Algorithms | Computer Communication Networks | Cryptology | IT Operations | Computers and Society | Computer and Information Systems Applications | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online
Contents:
Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS - Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS - Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.

There are no comments for this item.

Log in to your account to post a comment.