Ebook: Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
- Tags: Systems and Data Security, e-Commerce/e-business, Computer Communication Networks, Computer System Implementation, Management of Computing and Information Systems, Software Engineering
- Series: Lecture Notes in Computer Science 7967
- Year: 2013
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
Content:
Front Matter....Pages -
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting....Pages 1-20
ProVeX: Detecting Botnets with Encrypted Command and Control Channels....Pages 21-40
Exploring Discriminatory Features for Automated Malware Classification....Pages 41-61
PeerRush: Mining for Unwanted P2P Traffic....Pages 62-82
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks....Pages 83-101
PreparedJS: Secure Script-Templates for JavaScript....Pages 102-121
Securing Legacy Firefox Extensions with SENTINEL....Pages 122-138
Weaknesses in Defenses against Web-Borne Malware....Pages 139-149
SMS-Based One-Time Passwords: Attacks and Defense....Pages 150-159
Towards the Protection of Industrial Control Systems – Conclusions of a Vulnerability Analysis of Profinet IO....Pages 160-176
HeapSentry: Kernel-Assisted Protection against Heap Overflows....Pages 177-196
Preventing Backdoors in Server Applications with a Separated Software Architecture....Pages 197-206
Back Matter....Pages -
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
Content:
Front Matter....Pages -
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting....Pages 1-20
ProVeX: Detecting Botnets with Encrypted Command and Control Channels....Pages 21-40
Exploring Discriminatory Features for Automated Malware Classification....Pages 41-61
PeerRush: Mining for Unwanted P2P Traffic....Pages 62-82
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks....Pages 83-101
PreparedJS: Secure Script-Templates for JavaScript....Pages 102-121
Securing Legacy Firefox Extensions with SENTINEL....Pages 122-138
Weaknesses in Defenses against Web-Borne Malware....Pages 139-149
SMS-Based One-Time Passwords: Attacks and Defense....Pages 150-159
Towards the Protection of Industrial Control Systems – Conclusions of a Vulnerability Analysis of Profinet IO....Pages 160-176
HeapSentry: Kernel-Assisted Protection against Heap Overflows....Pages 177-196
Preventing Backdoors in Server Applications with a Separated Software Architecture....Pages 197-206
Back Matter....Pages -
....
Download the book Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)