Skip to main content
  • Conference proceedings
  • © 2006

Detection of Intrusions and Malware, and Vulnerability Assessment

Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4064)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (11 papers)

  1. Front Matter

  2. Code Analysis

    1. Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs

      • Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl Levitt, Matt Bishop
      Pages 1-16
    2. Using Static Program Analysis to Aid Intrusion Detection

      • Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Kruegel
      Pages 17-36
  3. Intrusion Detection

    1. Network–Level Polymorphic Shellcode Detection Using Emulation

      • Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
      Pages 54-73
    2. Detecting Unknown Network Attacks Using Language Models

      • Konrad Rieck, Pavel Laskov
      Pages 74-90
  4. Threat Protection and Response

    1. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones

      • Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee
      Pages 91-108
    2. Using Contextual Security Policies for Threat Response

      • Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens
      Pages 109-128
  5. Malware and Forensics

    1. Detecting Self-mutating Malware Using Control-Flow Graph Matching

      • Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
      Pages 129-143
    2. Digital Forensic Reconstruction and the Virtual Security Testbed ViSe

      • André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer
      Pages 144-163
  6. Deployment Scenarios

    1. A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs

      • Marko Jahnke, Jens Tölle, Sascha Lettgen, Michael Bussmann, Uwe Weddige
      Pages 164-180
    2. A Fast Worm Scan Detection Tool for VPN Congestion Avoidance

      • Arno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi, Bernhard Plattner
      Pages 181-194
  7. Back Matter

Other Volumes

  1. Detection of Intrusions and Malware & Vulnerability Assessment

Editors and Affiliations

  • RWE AG, Essen, Germany

    Roland Büschkes

  • Wilhelm-Schickard-Institute for Computer Science, University of Tübingen, Tübingen, Germany

    Pavel Laskov

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access