Detection of Intrusions and Malware, and Vulnerability Assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings / [electronic resource] :
edited by Christian Kreibich, Marko Jahnke.
- 1st ed. 2010.
- XII, 219 p. 55 illus. online resource.
- Security and Cryptology, 6201 2946-1863 ; .
- Security and Cryptology, 6201 .
Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS - Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
9783642142154
10.1007/978-3-642-14215-4 doi
Computer networks . Cryptography. Data encryption (Computer science). Electronic data processing--Management. Computers and civilization. Application software. Algorithms. Computer Communication Networks. Cryptology. IT Operations. Computers and Society. Computer and Information Systems Applications. Algorithms.