Limit search to available items
Book Cover
E-book
Author RAID (Symposium) (14th : 2011 : Menlo Park, Calif.)

Title Recent advances in intrusion detection : 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings / Robin Sommer, Davide Balzarotti, Gregor Maier (eds.)
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (x, 397 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 6961
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6961. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Minemu: The World's Fastest Taint Tracker / Erik Bosman, Asia Slowinska and Herbert Bos -- Dymo: Tracking Dynamic Code Identity / Bob Gilbert, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna -- Automated Identification of Cryptographic Primitives in Binary Programs / Felix Gröbert, Carsten Willems and Thorsten Holz -- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode / Yanick Fratantonio, Christopher Kruegel and Giovanni Vigna -- KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware / Stefano Ortolani, Cristiano Giuffrida and Bruno Crispo -- Packed, Printable, and Polymorphic Return-Oriented Programming / Kangjie Lu, Dabi Zou, Weiping Wen and Debin Gao -- On the Expressiveness of Return-into-libc Attacks / Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang and Vincent Freeh, et al. -- Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close / Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou and Salvatore J. Stolfo -- Revisiting Traffic Anomaly Detection Using Software Defined Networking / Syed Akbar Mehdi, Junaid Khalid and Syed Ali Khayam -- Modeling User Search Behavior for Masquerade Detection / Malek Ben Salem and Salvatore J. Stolfo -- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack / Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru and Radu State -- Detecting Traffic Snooping in Tor Using Decoys / Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis and Angelos D. Keromytis -- Cross-Analysis of Botnet Victims: New Insights and Implications / Seungwon Shin, Raymond Lin and Guofei Gu -- Banksafe Information Stealer Detection Inside the Web Browser -- Armin Buescher, Felix Leder and Thomas Siebert -- IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM / Mario Heiderich, Tilman Frosch and Thorsten Holz --tSpam Filtering in Twitter Using Sender-Receiver Relationship / Jonghyuk Song, Sangho Lee and Jong Kim -- Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers / Chao Yang, Robert Chandler Harkreader and Guofei Gu -- Detecting Environment-Sensitive Malware / Martina Lindorfer, Clemens Kolbitsch and Paolo Milani Comparetti -- Defending Embedded Systems with Software Symbiotes / Ang Cui and Salvatore J. Stolfo -- What If You Can't Trust Your Network Card? / Loïc Duflot, Yves-Alexis Perez and Benjamin Morin
Summary This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments
Analysis Computer science
Computer Communication Networks
Data structures (Computer science)
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Data Structures, Cryptology and Information Theory
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Subject Intrusion detection systems (Computer security) -- Congresses
Informatique.
Intrusion detection systems (Computer security)
Electrical & Computer Engineering.
Engineering & Applied Sciences.
Computer Science.
Telecommunications.
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Sommer, Robin.
Balzarotti, Davide.
Maier, Gregor, 1979-
ISBN 9783642236440
3642236448
Other Titles RAID 2011