Description |
1 online resource (x, 397 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6961 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6961. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Minemu: The World's Fastest Taint Tracker / Erik Bosman, Asia Slowinska and Herbert Bos -- Dymo: Tracking Dynamic Code Identity / Bob Gilbert, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna -- Automated Identification of Cryptographic Primitives in Binary Programs / Felix Gröbert, Carsten Willems and Thorsten Holz -- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode / Yanick Fratantonio, Christopher Kruegel and Giovanni Vigna -- KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware / Stefano Ortolani, Cristiano Giuffrida and Bruno Crispo -- Packed, Printable, and Polymorphic Return-Oriented Programming / Kangjie Lu, Dabi Zou, Weiping Wen and Debin Gao -- On the Expressiveness of Return-into-libc Attacks / Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang and Vincent Freeh, et al. -- Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close / Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou and Salvatore J. Stolfo -- Revisiting Traffic Anomaly Detection Using Software Defined Networking / Syed Akbar Mehdi, Junaid Khalid and Syed Ali Khayam -- Modeling User Search Behavior for Masquerade Detection / Malek Ben Salem and Salvatore J. Stolfo -- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack / Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru and Radu State -- Detecting Traffic Snooping in Tor Using Decoys / Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis and Angelos D. Keromytis -- Cross-Analysis of Botnet Victims: New Insights and Implications / Seungwon Shin, Raymond Lin and Guofei Gu -- Banksafe Information Stealer Detection Inside the Web Browser -- Armin Buescher, Felix Leder and Thomas Siebert -- IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM / Mario Heiderich, Tilman Frosch and Thorsten Holz --tSpam Filtering in Twitter Using Sender-Receiver Relationship / Jonghyuk Song, Sangho Lee and Jong Kim -- Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers / Chao Yang, Robert Chandler Harkreader and Guofei Gu -- Detecting Environment-Sensitive Malware / Martina Lindorfer, Clemens Kolbitsch and Paolo Milani Comparetti -- Defending Embedded Systems with Software Symbiotes / Ang Cui and Salvatore J. Stolfo -- What If You Can't Trust Your Network Card? / Loïc Duflot, Yves-Alexis Perez and Benjamin Morin |
Summary |
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data structures (Computer science) |
|
Data encryption (Computer science) |
|
Computer software |
|
Information Systems |
|
Data Encryption |
|
Management of Computing and Information Systems |
|
Computers and Society |
|
Algorithm Analysis and Problem Complexity |
|
Data Structures, Cryptology and Information Theory |
Notes |
International conference proceedings |
Bibliography |
Includes bibliographical references and author index |
Subject |
Intrusion detection systems (Computer security) -- Congresses
|
|
Informatique.
|
|
Intrusion detection systems (Computer security)
|
|
Electrical & Computer Engineering.
|
|
Engineering & Applied Sciences.
|
|
Computer Science.
|
|
Telecommunications.
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Sommer, Robin.
|
|
Balzarotti, Davide.
|
|
Maier, Gregor, 1979-
|
ISBN |
9783642236440 |
|
3642236448 |
|