Detection of Intrusions and Malware, and Vulnerability Assessment

9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers

  • Ulrich Flegel
  • Evangelos Markatos
  • William Robertson
Conference proceedings DIMVA 2012

DOI: 10.1007/978-3-642-37300-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7591)

Table of contents (14 papers)

  1. Front Matter
  2. Malware I

    1. Using File Relationships in Malware Classification
      Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu
      Pages 1-20
    2. Understanding DMA Malware
      Patrick Stewin, Iurii Bystrov
      Pages 21-41
    3. Large-Scale Analysis of Malware Downloaders
      Christian Rossow, Christian Dietrich, Herbert Bos
      Pages 42-61
  3. Mobile Security

    1. Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications
      Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song
      Pages 62-81
    2. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems
      Min Zheng, Patrick P. C. Lee, John C. S. Lui
      Pages 82-101
  4. Malware II

    1. A Static, Packer-Agnostic Filter to Detect Similar Malware Samples
      Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna
      Pages 102-122
    2. Experiments with Malware Visualization
      Yongzheng Wu, Roland H. C. Yap
      Pages 123-133
    3. Tracking Memory Writes for Malware Classification and Code Reuse Identification
      André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna
      Pages 134-143
  5. Secure Design

    1. System-Level Support for Intrusion Recovery
      Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos
      Pages 144-163
    2. NetGator: Malware Detection Using Program Interactive Challenges
      Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou
      Pages 164-183
    3. SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines
      Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz
      Pages 184-203
  6. IDS

    1. BISSAM: Automatic Vulnerability Identification of Office Documents
      Thomas Schreck, Stefan Berger, Jan Göbel
      Pages 204-213
    2. Self-organized Collaboration of Distributed IDS Sensors
      Karel Bartos, Martin Rehak, Michal Svoboda
      Pages 214-231
    3. Shedding Light on Log Correlation in Network Forensics Analysis
      Elias Raftopoulos, Matthias Egli, Xenofontas Dimitropoulos
      Pages 232-241
  7. Back Matter

About these proceedings


This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).


code reuse intrusion recovery malware classification mobile devices network forensics

Editors and affiliations

  • Ulrich Flegel
    • 1
  • Evangelos Markatos
    • 2
  • William Robertson
    • 3
  1. 1.Department CHFT StuttgartStuttgartGermany
  2. 2.Department of Computer ScienceFoundation for Research and Technology – Hellas (FORTH)HeraklionGreece
  3. 3.College of Computer and Information ScienceNortheastern UniversityBostonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37299-5
  • Online ISBN 978-3-642-37300-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349