Skip to main content
  • Conference proceedings
  • © 2010

Detection of Intrusions and Malware, and Vulnerability Assessment

7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings

  • Unique visibility, state-of-the-art survey,

  • fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6201)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2010.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (12 papers)

  1. Front Matter

  2. Host Security

    1. HookScout: Proactive Binary-Centric Hook Detection

      • Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Song
      Pages 1-20
    2. Conqueror: Tamper-Proof Code Execution on Legacy Systems

      • Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi
      Pages 21-40
    3. dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection

      • Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti, Ulrich Bayer
      Pages 41-60
  3. Trends

    1. Evaluating Bluetooth as a Medium for Botnet Command and Control

      • Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee
      Pages 61-80
    2. Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype

      • Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell’Amico, Lorenzo Cavallaro
      Pages 81-100
    3. Covertly Probing Underground Economy Marketplaces

      • Hanno Fallmann, Gilbert Wondracek, Christian Platzer
      Pages 101-110
  4. Vulnerabilities

    1. Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners

      • Adam Doupé, Marco Cova, Giovanni Vigna
      Pages 111-131
    2. Organizing Large Scale Hacking Competitions

      • Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele et al.
      Pages 132-152
  5. Intrusion Detection

    1. An Online Adaptive Approach to Alert Correlation

      • Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani
      Pages 153-172
    2. KIDS – Keyed Intrusion Detection System

      • Sasa Mrdovic, Branislava Drazenovic
      Pages 173-182
  6. Web Security

    1. HProxy: Client-Side Detection of SSL Stripping Attacks

      • Nick Nikiforakis, Yves Younan, Wouter Joosen
      Pages 200-218
  7. Back Matter

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

Keywords

  • Blue Tooth Botnets
  • Hacking
  • Hacking C
  • Hacking Competitions
  • Intrusion Detection
  • Network Security
  • Overlay Networks
  • Search Worms
  • Skype
  • Stripping Attacks
  • Web Security
  • Web Vulnerability
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • International Computer Science Institute, Berkeley, USA

    Christian Kreibich

  • Research Establishment for Applied Science (FGAN), Research Institute for Communication, Information Processing and Ergonomics (FKIE), Wachtberg, Germany

    Marko Jahnke

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions