Skip to main content
  • Conference proceedings
  • © 2010

Detection of Intrusions and Malware, and Vulnerability Assessment

7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings

  • Unique visibility, state-of-the-art survey,
  • fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6201)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 papers)

  1. Front Matter

  2. Host Security

    1. HookScout: Proactive Binary-Centric Hook Detection

      • Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Song
      Pages 1-20
    2. Conqueror: Tamper-Proof Code Execution on Legacy Systems

      • Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi
      Pages 21-40
    3. dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection

      • Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti, Ulrich Bayer
      Pages 41-60
  3. Trends

    1. Evaluating Bluetooth as a Medium for Botnet Command and Control

      • Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee
      Pages 61-80
    2. Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype

      • Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell’Amico, Lorenzo Cavallaro
      Pages 81-100
    3. Covertly Probing Underground Economy Marketplaces

      • Hanno Fallmann, Gilbert Wondracek, Christian Platzer
      Pages 101-110
  4. Vulnerabilities

    1. Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners

      • Adam Doupé, Marco Cova, Giovanni Vigna
      Pages 111-131
    2. Organizing Large Scale Hacking Competitions

      • Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele et al.
      Pages 132-152
  5. Intrusion Detection

    1. An Online Adaptive Approach to Alert Correlation

      • Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani
      Pages 153-172
    2. KIDS – Keyed Intrusion Detection System

      • Sasa Mrdovic, Branislava Drazenovic
      Pages 173-182
  6. Web Security

    1. HProxy: Client-Side Detection of SSL Stripping Attacks

      • Nick Nikiforakis, Yves Younan, Wouter Joosen
      Pages 200-218
  7. Back Matter

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

Editors and Affiliations

  • International Computer Science Institute, Berkeley, USA

    Christian Kreibich

  • Research Establishment for Applied Science (FGAN), Research Institute for Communication, Information Processing and Ergonomics (FKIE), Wachtberg, Germany

    Marko Jahnke

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access