Amazon cover image
Image from Amazon.com

Recent advances in intrusion detection : 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings / Robin Sommer, Davide Balzarotti, Gregor Maier (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 6961. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2011.Description: 1 online resource (x, 397 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642236440
  • 3642236448
Other title:
  • RAID 2011
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59 .R35 2011
Online resources:
Contents:
Minemu: The World's Fastest Taint Tracker / Erik Bosman, Asia Slowinska and Herbert Bos -- Dymo: Tracking Dynamic Code Identity / Bob Gilbert, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna -- Automated Identification of Cryptographic Primitives in Binary Programs / Felix Gröbert, Carsten Willems and Thorsten Holz -- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode / Yanick Fratantonio, Christopher Kruegel and Giovanni Vigna -- KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware / Stefano Ortolani, Cristiano Giuffrida and Bruno Crispo -- Packed, Printable, and Polymorphic Return-Oriented Programming / Kangjie Lu, Dabi Zou, Weiping Wen and Debin Gao -- On the Expressiveness of Return-into-libc Attacks / Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang and Vincent Freeh, et al. -- Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close / Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou and Salvatore J. Stolfo -- Revisiting Traffic Anomaly Detection Using Software Defined Networking / Syed Akbar Mehdi, Junaid Khalid and Syed Ali Khayam -- Modeling User Search Behavior for Masquerade Detection / Malek Ben Salem and Salvatore J. Stolfo -- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack / Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru and Radu State -- Detecting Traffic Snooping in Tor Using Decoys / Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis and Angelos D. Keromytis -- Cross-Analysis of Botnet Victims: New Insights and Implications / Seungwon Shin, Raymond Lin and Guofei Gu -- Banksafe Information Stealer Detection Inside the Web Browser -- Armin Buescher, Felix Leder and Thomas Siebert -- IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM / Mario Heiderich, Tilman Frosch and Thorsten Holz --tSpam Filtering in Twitter Using Sender-Receiver Relationship / Jonghyuk Song, Sangho Lee and Jong Kim -- Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers / Chao Yang, Robert Chandler Harkreader and Guofei Gu -- Detecting Environment-Sensitive Malware / Martina Lindorfer, Clemens Kolbitsch and Paolo Milani Comparetti -- Defending Embedded Systems with Software Symbiotes / Ang Cui and Salvatore J. Stolfo -- What If You Can't Trust Your Network Card? / Loïc Duflot, Yves-Alexis Perez and Benjamin Morin.
Summary: This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

International conference proceedings.

Includes bibliographical references and author index.

Minemu: The World's Fastest Taint Tracker / Erik Bosman, Asia Slowinska and Herbert Bos -- Dymo: Tracking Dynamic Code Identity / Bob Gilbert, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna -- Automated Identification of Cryptographic Primitives in Binary Programs / Felix Gröbert, Carsten Willems and Thorsten Holz -- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode / Yanick Fratantonio, Christopher Kruegel and Giovanni Vigna -- KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware / Stefano Ortolani, Cristiano Giuffrida and Bruno Crispo -- Packed, Printable, and Polymorphic Return-Oriented Programming / Kangjie Lu, Dabi Zou, Weiping Wen and Debin Gao -- On the Expressiveness of Return-into-libc Attacks / Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang and Vincent Freeh, et al. -- Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close / Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou and Salvatore J. Stolfo -- Revisiting Traffic Anomaly Detection Using Software Defined Networking / Syed Akbar Mehdi, Junaid Khalid and Syed Ali Khayam -- Modeling User Search Behavior for Masquerade Detection / Malek Ben Salem and Salvatore J. Stolfo -- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack / Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru and Radu State -- Detecting Traffic Snooping in Tor Using Decoys / Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis and Angelos D. Keromytis -- Cross-Analysis of Botnet Victims: New Insights and Implications / Seungwon Shin, Raymond Lin and Guofei Gu -- Banksafe Information Stealer Detection Inside the Web Browser -- Armin Buescher, Felix Leder and Thomas Siebert -- IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM / Mario Heiderich, Tilman Frosch and Thorsten Holz --tSpam Filtering in Twitter Using Sender-Receiver Relationship / Jonghyuk Song, Sangho Lee and Jong Kim -- Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers / Chao Yang, Robert Chandler Harkreader and Guofei Gu -- Detecting Environment-Sensitive Malware / Martina Lindorfer, Clemens Kolbitsch and Paolo Milani Comparetti -- Defending Embedded Systems with Software Symbiotes / Ang Cui and Salvatore J. Stolfo -- What If You Can't Trust Your Network Card? / Loïc Duflot, Yves-Alexis Perez and Benjamin Morin.

This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.

Powered by Koha