Skip to main content
  • Conference proceedings
  • © 2007

Detection of Intrusions and Malware, and Vulnerability Assessment

4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4579)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (14 papers)

  1. Front Matter

  2. Web Security

    1. Extensible Web Browser Security

      • Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan
      Pages 1-19
    2. On the Effectiveness of Techniques to Detect Phishing Sites

      • Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel
      Pages 20-39
  3. Intrusion Detection

    1. Characterizing Bots’ Remote Control Behavior

      • Elizabeth Stinson, John C. Mitchell
      Pages 89-108
  4. Traffic Analysis

    1. Measurement and Analysis of Autonomous Spreading Malware in a University Environment

      • Jan Goebel, Thorsten Holz, Carsten Willems
      Pages 109-128
    2. Passive Monitoring of DNS Anomalies

      • Bojan Zdrnja, Nevil Brownlee, Duane Wessels
      Pages 129-139
    3. Characterizing Dark DNS Behavior

      • Jon Oberheide, Manish Karir, Z. Morley Mao
      Pages 140-156
  5. Network Security

    1. Distributed Evasive Scan Techniques and Countermeasures

      • Min Gyung Kang, Juan Caballero, Dawn Song
      Pages 157-174
    2. On the Adaptive Real-Time Detection of Fast-Propagating Network Worms

      • Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson
      Pages 175-192
  6. Host Security

    1. Targeting Physically Addressable Memory

      • David R. Piegdon, Lexi Pimenidis
      Pages 193-212
    2. Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks

      • Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi
      Pages 213-230
    3. A Study of Malcode-Bearing Documents

      • Wei-Jen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
      Pages 231-250
  7. Back Matter

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

Keywords

  • Monitor
  • access control
  • anomaly detection
  • audit control
  • authentication
  • cryptographic algorithms
  • honeypots
  • information-hiding
  • intrusion detection
  • invasive software
  • malware
  • network intrusion
  • network security
  • sec
  • security

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access