Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings / edited by Klaus Julisch, Christopher Kruegel.

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security — Intrusion Detection and Response (SI...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Julisch, Klaus (Editor), Kruegel, Christopher (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edition:1st ed. 2005.
Series:Security and Cryptology ; 3548
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Obfuscated Code Detection
  • Analyzing Memory Accesses in Obfuscated x86 Executables
  • Hybrid Engine for Polymorphic Shellcode Detection
  • Honeypots
  • Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities
  • A Pointillist Approach for Comparing Honeypots
  • Vulnerability Assessment and Exploit Analysis
  • Automatic Detection of Attacks on Cryptographic Protocols: A Case Study
  • METAL – A Tool for Extracting Attack Manifestations
  • Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
  • Anomaly Detection
  • A Learning-Based Approach to the Detection of SQL Attacks
  • Masquerade Detection via Customized Grammars
  • A Prevention Model for Algorithmic Complexity Attacks
  • Misuse Detection
  • Detecting Malicious Code by Model Checking
  • Improving the Efficiency of Misuse Detection
  • Distributed Intrusion Detection and IDS Testing
  • Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context
  • TCPtransform: Property-Oriented TCP Traffic Transformation.