Detection of Intrusions and Malware, and Vulnerability Assessment

9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-37299-5 (Print) 978-3-642-37300-8 (Online)

Table of contents (14 chapters)

  1. Front Matter

    Pages -

  2. Malware I

    1. No Access

      Book Chapter

      Pages 1-20

      Using File Relationships in Malware Classification

    2. No Access

      Book Chapter

      Pages 21-41

      Understanding DMA Malware

    3. No Access

      Book Chapter

      Pages 42-61

      Large-Scale Analysis of Malware Downloaders

  3. Mobile Security

    1. No Access

      Book Chapter

      Pages 62-81

      Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications

    2. No Access

      Book Chapter

      Pages 82-101

      ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems

  4. Malware II

    1. No Access

      Book Chapter

      Pages 102-122

      A Static, Packer-Agnostic Filter to Detect Similar Malware Samples

    2. No Access

      Book Chapter

      Pages 123-133

      Experiments with Malware Visualization

    3. No Access

      Book Chapter

      Pages 134-143

      Tracking Memory Writes for Malware Classification and Code Reuse Identification

  5. Secure Design

    1. No Access

      Book Chapter

      Pages 144-163

      System-Level Support for Intrusion Recovery

    2. No Access

      Book Chapter

      Pages 164-183

      NetGator: Malware Detection Using Program Interactive Challenges

    3. No Access

      Book Chapter

      Pages 184-203

      SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines

  6. IDS

    1. No Access

      Book Chapter

      Pages 204-213

      BISSAM: Automatic Vulnerability Identification of Office Documents

    2. No Access

      Book Chapter

      Pages 214-231

      Self-organized Collaboration of Distributed IDS Sensors

    3. No Access

      Book Chapter

      Pages 232-241

      Shedding Light on Log Correlation in Network Forensics Analysis

  7. Back Matter

    Pages -