Coverart for item
The Resource Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Ulrich Flegel, Danilo Bruschi

Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Ulrich Flegel, Danilo Bruschi

Label
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
Title
Detection of Intrusions and Malware, and Vulnerability Assessment
Title remainder
6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
Statement of responsibility
edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Ulrich Flegel, Danilo Bruschi
Creator
Contributor
Subject
Language
eng
Summary
This book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2009, held in Milan, Italy, in July 2009. The 10 revised full papers presented together with three extended abstracts were carefully selected from 44 initial submissions. The papers are organized in topical sections on malware and SPAM, emulation-based detection, software diversity, harnessing context, and anomaly detection
Member of
Cataloging source
MND
http://library.link/vocab/creatorName
Hutchison, David
Dewey number
005. 8
Image bit depth
0
Index
no index present
LC call number
QA76. 9. A25
LC item number
D563 2009
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Flegel, Ulrich
  • Mitchell, John C
  • Terzopoulos, Demetri
  • Sudan, Madhu
  • Steffen, Bernhard
  • Pandu Rangan, C
  • Nierstrasz, Oscar
  • Naor, Moni
  • Mattern, Friedemann
  • Kleinberg, Jon M
  • Kittler, Josef
  • Bruschi, Danilo
  • Weikum, Gerhard
  • Vardi, Moshe Y
  • Tygar, Doug
  • Kanade, Takeo
Series statement
Lecture notes in computer science,
Series volume
5587
http://library.link/vocab/subjectName
  • Data protection
  • Computer Communication Networks
  • Information Systems
  • Data encryption (Computer science)
  • Computer science
  • Management of Computing and Information Systems
  • Computers and Society
  • Data Encryption
  • Computer Science
  • Systems and Data Security
Label
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Ulrich Flegel, Danilo Bruschi
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection
Dimensions
unknown
Extent
1 online resource (:
File format
multiple file formats
Form of item
online
Isbn
9783642029189
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
v.: digital.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • SPR428884868
  • ocn428884868
Label
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Ulrich Flegel, Danilo Bruschi
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection
Dimensions
unknown
Extent
1 online resource (:
File format
multiple file formats
Form of item
online
Isbn
9783642029189
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
v.: digital.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • SPR428884868
  • ocn428884868

Library Locations

Processing Feedback ...