Malware Detection

ISBN: 978-0-387-32720-4 (Print) 978-0-387-44599-1 (Online)

Table of contents (13 chapters)

  1. Front Matter

    Pages I-XI

  2. Overview

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-15

      Malware Evolution: A Snapshot of Threats and Countermeasures in 2005

  3. Software Analysis and Assurance

    1. Front Matter

      Pages 17-17

    2. No Access

      Book Chapter

      Pages 19-41

      Static Disassembly and Code Analysis

    3. No Access

      Book Chapter

      Pages 43-61

      A Next-Generation Platform for Analyzing Executables

    4. No Access

      Book Chapter

      Pages 63-83

      Behavioral and Structural Properties of Malicious Code

    5. No Access

      Book Chapter

      Pages 85-109

      Detection and Prevention of SQL Injection Attacks

  4. Distributed Threat Detection and Defense

    1. Front Matter

      Pages 111-111

    2. No Access

      Book Chapter

      Pages 113-145

      Very Fast Containment of Scanning Worms, Revisited

    3. No Access

      Book Chapter

      Pages 147-170

      Sting: An End-to-End Self-Healing System for Defending against Internet Worms

    4. No Access

      Book Chapter

      Pages 171-191

      An Inside Look at Botnets

    5. No Access

      Book Chapter

      Pages 193-209

      Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?

  5. Stealthy and Targeted Threat Detection and Defense

    1. Front Matter

      Pages 211-211

    2. No Access

      Book Chapter

      Pages 213-229

      Composite Hybrid Techniques For Defending Against Targeted Attacks

    3. No Access

      Book Chapter

      Pages 231-249

      Towards Stealthy Malware Detection

  6. Novel Techniques for Constructing Trustworthy Services

    1. Front Matter

      Pages 251-251

    2. No Access

      Book Chapter

      Pages 253-289

      Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems

    3. No Access

      Book Chapter

      Pages 291-307

      Principles of Secure Information Flow Analysis

  7. Back Matter

    Pages 309-312