Skip to main content
  • Conference proceedings
  • © 2008

Visualization for Computer Security

5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5210)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): VizSec: International Workshop on Visualization for Computer Security

Conference proceedings info: VizSec 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Visual Reverse Engineering of Binary and Data Files

    • Gregory Conti, Erik Dean, Matthew Sinda, Benjamin Sangster
    Pages 1-17
  3. Effective Visualization of File System Access-Control

    • Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia
    Pages 18-25
  4. Visual Analysis of Program Flow Data with Data Propagation

    • Ying Xia, Kevin Fairbanks, Henry Owen
    Pages 26-35
  5. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool

    • Leevar Williams, Richard Lippmann, Kyle Ingols
    Pages 44-59
  6. A Graph-Theoretic Visualization Approach to Network Risk Analysis

    • Scott O’Hare, Steven Noel, Kenneth Prole
    Pages 60-67
  7. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    • John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen
    Pages 68-79
  8. Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization

    • T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan II
    Pages 80-86
  9. A Task Centered Framework for Computer Security Data Visualization

    • Xiaoyuan Suo, Ying Zhu, Scott Owen
    Pages 87-94
  10. BGPeep: An IP-Space Centered View for Internet Routing Data

    • James Shearer, Kwan-Liu Ma, Toby Kohlenberg
    Pages 95-110
  11. Large-Scale Network Monitoring for Visual Analysis of Attacks

    • Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel
    Pages 111-118
  12. Visualizing Real-Time Network Resource Usage

    • Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman
    Pages 119-135
  13. Wireless Cyber Assets Discovery Visualization

    • Kenneth Prole, John R. Goodall, Anita D. D’Amico, Jason K. Kopylec
    Pages 136-143
  14. NetFlow Data Visualization Based on Graphs

    • Pavel Minarik, Tomas Dymacek
    Pages 144-151
  15. Backhoe, a Packet Trace and Log Browser

    • Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina
    Pages 152-160
  16. Back Matter

Other Volumes

  1. Visualization for Computer Security

About this book

This book constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID). The 18 papers presented in this volume were carefully reviewed and selected from 27 submissions. VizSec research has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense. This year's paper focus on bridging the gap between visualization and automation.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access