Skip to main content
  • Conference proceedings
  • © 2013

Detection of Intrusions and Malware, and Vulnerability Assessment

9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7591)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2012.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 papers)

  1. Front Matter

  2. Malware I

    1. Using File Relationships in Malware Classification

      • Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu
      Pages 1-20
    2. Understanding DMA Malware

      • Patrick Stewin, Iurii Bystrov
      Pages 21-41
    3. Large-Scale Analysis of Malware Downloaders

      • Christian Rossow, Christian Dietrich, Herbert Bos
      Pages 42-61
  3. Mobile Security

    1. Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications

      • Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song
      Pages 62-81
    2. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems

      • Min Zheng, Patrick P. C. Lee, John C. S. Lui
      Pages 82-101
  4. Malware II

    1. A Static, Packer-Agnostic Filter to Detect Similar Malware Samples

      • Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna
      Pages 102-122
    2. Experiments with Malware Visualization

      • Yongzheng Wu, Roland H. C. Yap
      Pages 123-133
    3. Tracking Memory Writes for Malware Classification and Code Reuse Identification

      • André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna
      Pages 134-143
  5. Secure Design

    1. System-Level Support for Intrusion Recovery

      • Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos
      Pages 144-163
    2. NetGator: Malware Detection Using Program Interactive Challenges

      • Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou
      Pages 164-183
    3. SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines

      • Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz
      Pages 184-203
  6. IDS

    1. BISSAM: Automatic Vulnerability Identification of Office Documents

      • Thomas Schreck, Stefan Berger, Jan Göbel
      Pages 204-213
    2. Self-organized Collaboration of Distributed IDS Sensors

      • Karel Bartos, Martin Rehak, Michal Svoboda
      Pages 214-231
    3. Shedding Light on Log Correlation in Network Forensics Analysis

      • Elias Raftopoulos, Matthias Egli, Xenofontas Dimitropoulos
      Pages 232-241
  7. Back Matter

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

About this book

This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).

Editors and Affiliations

  • Department C, HFT Stuttgart, Stuttgart, Germany

    Ulrich Flegel

  • Department of Computer Science, Foundation for Research and Technology – Hellas (FORTH), Heraklion, Greece

    Evangelos Markatos

  • College of Computer and Information Science, Northeastern University, Boston, USA

    William Robertson

Bibliographic Information

  • Book Title: Detection of Intrusions and Malware, and Vulnerability Assessment

  • Book Subtitle: 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers

  • Editors: Ulrich Flegel, Evangelos Markatos, William Robertson

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-37300-8

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-37299-5Published: 19 March 2013

  • eBook ISBN: 978-3-642-37300-8Published: 15 March 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: X, 243

  • Number of Illustrations: 86 b/w illustrations

  • Topics: Systems and Data Security, e-Commerce/e-business, Computer Communication Networks, Computer System Implementation

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access