Detection of Intrusions and Malware, and Vulnerability Assessment

9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers

  • Ulrich Flegel
  • Evangelos Markatos
  • William Robertson

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7591)

Table of contents

  1. Front Matter
  2. Malware I

    1. Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu
      Pages 1-20
    2. Patrick Stewin, Iurii Bystrov
      Pages 21-41
    3. Christian Rossow, Christian Dietrich, Herbert Bos
      Pages 42-61
  3. Mobile Security

    1. Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song
      Pages 62-81
    2. Min Zheng, Patrick P. C. Lee, John C. S. Lui
      Pages 82-101
  4. Malware II

    1. Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna
      Pages 102-122
    2. Yongzheng Wu, Roland H. C. Yap
      Pages 123-133
    3. André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna
      Pages 134-143
  5. Secure Design

    1. Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos
      Pages 144-163
    2. Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou
      Pages 164-183
    3. Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz
      Pages 184-203
  6. IDS

    1. Thomas Schreck, Stefan Berger, Jan Göbel
      Pages 204-213
    2. Karel Bartos, Martin Rehak, Michal Svoboda
      Pages 214-231
    3. Elias Raftopoulos, Matthias Egli, Xenofontas Dimitropoulos
      Pages 232-241
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).

Keywords

code reuse intrusion recovery malware classification mobile devices network forensics

Editors and affiliations

  • Ulrich Flegel
    • 1
  • Evangelos Markatos
    • 2
  • William Robertson
    • 3
  1. 1.Department CHFT StuttgartStuttgartGermany
  2. 2.Department of Computer ScienceFoundation for Research and Technology – Hellas (FORTH)HeraklionGreece
  3. 3.College of Computer and Information ScienceNortheastern UniversityBostonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-37300-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37299-5
  • Online ISBN 978-3-642-37300-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book